Cyber behavior & culture
Why is human behaviour a threat to cyber security?
Organisations face a wide range of cyber threats from hackers, disgruntled staff members and individuals who are often unaware of how their risky online behaviour could result in a costly compromise of customer, staff or company information.
Examples of human cyber risks include (but are not limited to):
- Clicking on links or attachments in suspicious scam or phishing emails; or
- Accidentally sending personal data via email to the wrong person
Hackers are well aware of human vulnerability and use clever phishing tactics to trick people into helping them obtain unauthorised access to company systems and information and no industry is immune from cyber attacks.
Lack of investment in cyber security policies, training and awareness
Organisations tend to invest resources in security technical measures (e.g. firewalls, patching, vulnerability scanning, anti-virus software and penetration testing, etc) to protect critical assets, but often overlook the importance of implementing effective organisational measures (policies, awareness and training).
This is evident through:
- Policies: No cyber company policy exists or has been published. If a cyber policy exists it’s overly technical, out-of-date and difficult for staff to understand
- Training and awareness: Staff have not been trained or tested on their understanding of the cyber policy, external cyber threats and risks; and
- Roles and responsibilities: In the event of a data breach, senior management or staff members may not be clear on their role in following incident response procedures
How can Mazars help you drive the necessary change?
Cyberculture maturity assessmentConducting cyber organisational culture maturity assessment. Informing strategy and plan including prioritisation of fit for purpose program solutions. | Phishing trainingTailoring and using real email phishing threats to an organisation. Selecting Staff to test and providing immediate teachable moments to reinforce expected behaviours. |
Cyber championsEstablishing a cross-functional working group to identify cyber human risks, building awareness and driving a cyber conscious workforce at the grassroots of an organisation. | Incident responsePreparing a well-defined, organised approach for handling any potential threat via an Incident Response Plan. Delivering role play data breach simulations to test organisations readiness. |
Cyber policyDeveloping and launching creative and visually appealing cyber policies, in conjunction with the business departments. | Cyber awarenessSequencing cyber awareness activities based on risk and |
Cyber trainingTailoring learning modules to reflect an organisation’s cyber policies and procedures. Delivering role based training enabling staff to work through interactive modules to reinforce learnings. | Cyber metrics and reportingMonitoring and reporting on program effectiveness. |