Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Keys to Employee Cybersecurity

By Sarah Ludwig
Albert Lewis

“(Security experts) tend to forget about people and focus on tools, but we need to help people at every level understand the threats they face,” says Albert Lewis, who has been involved in cybersecurity for more than 20 years. Photo courtesy of Albert Lewis.

Dr. Vincent Berk

 Generally, cybersecurity breaches are due to employee error—clicking on phishing scam emails or downloading programs that contain malware or spyware,” says Dr. Vincent Berk, CEO of FlowTraq. “People are unaware that they made a mistake.” Photo courtesy of Dr. Vincent Berk.  

Albert Lewis
Dr. Vincent Berk
November 1, 2014

Cyber breaches knows no boundaries and doesn’t discriminate based on business size. For example, a study by the National Cyber Security Alliance shows that even though 66 percent of the small businesses surveyed relied on the Internet on a daily basis and 69 percent handled sensitive data, only 23 percent had a written policy and procedure Internet security guide for their employees. Only 37 percent provided Internet safety training to their employees, and only 50 percent had a cybersecurity plan to keep their business secure.

“We have to come from an understanding that humans are traditionally very bad at estimating risks when the risks are small. These events that seem to be one in 10,000, what does that mean? It’s hard for people to assess how big the risk is,” says Dr. Vincent Berk, CEO of FlowTraq. Albert Lewis, a cybersecurity expert and Executive Board Member of Federal Information Systems Security Educators’ Association agrees. “It’s important for us to recognize that most employees don’t care about the attacks, they just want to get their work done,” he says. Thankfully, you don’t have to be a cybersecurity expert to implement good practices and policies in your business and help your employees learn to be more cyber aware.

           

Patch Software Frequently

When an update for your network’s operating system or software shows up, don’t delay – patch it immediately. “An entire network can be exploited because of a failure to patch,” says Lewis. However, doing an update can cause serious down time and potentially cost money with systems being unavailable. Every organization needs to decide in their policies and procedures how and when they will handle patches in order to remain as functional as possible. “If you don’t take care of this, you’re going to get hacked. Frequent patching is the low hanging preventative fruit when it comes to cybersecurity,” Lewis says. “It’s absolutely step one.”

 

Emphasize Employee Training And Education

All the experts interviewed agreed that employee training and education is paramount in staying cyber secure. Because the threat environment is so complex, employees need to be aware of their own and their company’s vulnerability and how to recognize and avoid cyber threats, says Mark Bermingham, Director of Global B2B Product Marketing at Kaspersky Labs. “Training is an important part of ensuring that people understand how to approach their jobs in a cyber-aware fashion,” says Lewis. Training should be done annually at the very least, though if a company gets new users, they should be trained right away, he says.

Berk believes that a monthly or even weekly newsletter reinforces the importance of cybersecurity. “It should be short, informational and very simple,” he says. “We need to see things 20 times or more before we start to remember them.” Hosting speakers on security topics and having quarterly discussions within the company are other good ways to strengthen awareness, Lewis says. Repetition is important in making cybersecurity part of employees’ consciousness because otherwise they start to view it on the same plane as sexual harassment, as if it does not really apply to them, says Berk. 

Getting employees to understand that cybersecurity is not just important at work, but that it affects them at home as well helps get and keep them engaged in staying cyber secure, says Lewis. “People don’t use computers just at work; they use them at home too. We’re on computers all day long,” he says. “I usually start by discussing their home experience. Are their systems backed up? Do they do their taxes on their computers? What vulnerable data do they have on their computers? They have a vested interest in protecting that. Once I get them thinking about that, I explain how the same principles apply at work.”

 

Have Policies And Procedures In Place

Companies should think about WHEN they get infiltrated, not IF, says Andrey Bozhogin, Senior Marketing Manager at Kaspersky Labs. Businesses need to have solid cybersecurity policies that mandate details like device control, a recovery plan, password size and length, and employee awareness and training. Prevention and reaction plans need to be in place in case of a breach. “Training will vary as far as your job function, but awareness applies to everyone there. There is a difference between the two. Awareness is a general approach to what’s going on, what the environment is like,” Lewis says. “Without a policy in place, it’s a safe bet that the training and awareness activities aren’t going to happen.” 

Device control is also essential because 5- to 10-percent of laptops or mobile devices will be lost or stolen, says Bermingham. Making sure these devices are secure and encrypted, as well as doing things like assigning certain hours in which thumb drives can be inserted and ensuring that auto-run is turned off, should be part of every company’s policies and procedures.

 

Lead By Example

For executives and IT staff, it’s important to set a good example of corporate diligence for the rest of the company. Executives are going to be the most likely target at a company, so they need to understand this and act accordingly, says Bermingham. Mobility is currently the biggest threat factor, particularly for an executive, causing the security perimeter to widen and threats to become more precarious, he says. “If an event happens, (executives should) share it with everyone,” says Berk. “Show them why they need to be careful.”

 

Try Red Teaming

It’s labor intensive, but taking time to do some red teaming really works, says Berk. “Pick a few good guys and have them try to get people’s credentials and turn it into a game. It makes the employees more aware,” he says. He suggests tests such as having the red team call an employee in the Accounts Payable department, saying they’re from IT and asking for the person’s password, saying they are trying to fix that person’s computer to see if they’ll give the password up. Another idea is to have the red team craft a phishing scam email and send it around to see which employees click on it. The other benefit of red teaming is that companies can find the weakest link, says Berk.

 

Have Well-Defined Job Roles

“Whatever level you’re at, you’re a potential target for adversaries,” says Lewis. “The first thing we need to do is give employees awareness. Rather than instituting a general approach to cyber training, I think role-based training can be instituted and that can ensure that everyone is trained appropriately.” Lewis recommends that companies check out publication 800-61r2 at the National Institute of Standards and Technology (www.nist.gov) to see a role-based model for federal information technology and cybersecurity training. “It can help companies plan and orchestrate an approach or methodology for introducing cybersecurity training in job functions,” he says.

A needs assessment should be conducted first, says Lewis. “You want to determine what aspects of cybersecurity each job role touches,” he says. “Looking at the job roles, you might see that an IT person controls a lot of access, which shows a vulnerability that needs to be addressed.” Companies need to think of the different roles people have and target cybersecurity training according to that job function. “It doesn’t need to be a week-long training,” says Lewis. “They just need to understand what good practices are surrounding their roles.”

Too often the people who program the code or operate the IT systems see cybersecurity as a secondary concern, or even an afterthought, Lewis says. Organizations, too, often don’t spend any resources making sure that their IT staff is trained in cybersecurity, let alone their entire staff. “Having the right people in the right place with the right amount of training to combat those threats is essential,” says Lewis. “Otherwise you’re vulnerable.”

 

Limit Access

All employees don’t need access to everything in the system. “If you don’t have a need to know, or a need to be accessing a system, you should not be allowed to. Access should be limited in terms of what (employees) need to know,” Lewis says. Limiting access cuts down on the risk of breaches within the company. “If there are some fundamental things you need to know to drive a car, there are some fundamental things you need to know before you can join the corporate IT knowledge network that contains sensitive data. Before you can touch this data, we’ve got to make sure that you are aware of the security of it,” says Berk.

You also need data separation. For instance, the marketing department does not need to have access to the financial department’s data; the financial department does not need access to IT’s data, and so on, says Bozhogin. In the event of an attack or breach, data separation also helps ensure that the attacker only gets access to certain information, rather than all the data the company has.

 

Report Suspicious Activity

Setting up a quick and easy way for employees to report suspicious activity, such as having a help desk or other central number they can call or text, is a great way to encourage cybersecurity, says Lewis. “If everyone’s aware of what good and bad cyber hygiene looks like, procedures can be put in place for employees to report if they see something going on.”

Taking time to implement cybersecurity measures like these is essential to the welfare of any company and in today’s climate should be a priority. For more information on cybersecurity training, check out the National Initiative for Cybersecurity Careers and Studies at www.niccs.us-cert.gov.   

KEYWORDS: cyber security awareness cyber strategy security awareness training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Unlock the future of cybersecurity news with Security.
As a leader in enterprise security, we have you covered with the information to keep you ahead of the curve.

JOIN TODAY

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-class

    How to Turn Every Employee into a Cybersecurity Expert

    See More
  • healthcare security freepik

    Health leaders, it’s time to prioritize cybersecurity culture and employee awareness

    See More
  • phone

    4 Keys to Creating a BYOD Program

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×
“(Security experts) tend to forget about people and focus on tools, but we need to help people at every level understand the threats they face,” says Albert Lewis, who has been involved in cybersecurity for more than 20 years. Photo courtesy of Albert Lewis.
 Generally, cybersecurity breaches are due to employee error—clicking on phishing scam emails or downloading programs that contain malware or spyware,” says Dr. Vincent Berk, CEO of FlowTraq. “People are unaware that they made a mistake.” Photo courtesy of Dr. Vincent Berk.  

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!