Blog

Cyber Security Week 3 - It's Everyone's Job to Ensure Online Safety at Work

10/26/2018

Week 3 of National Cybersecurity Awareness Month (NCSAM) has just wrapped up, and we want to shine a spotlight on helping everyone at work — from the break room to the boardroom — understand the importance of online safety. When you are on the job – whether it’s at your corporate office, a satellite location, or onsite with a client ‒ your organization’s online safety and security are a responsibility that everyone shares. And, as the lines between our work and daily lives become increasingly blurred, it is more important than ever to be certain that smart cybersecurity carries over between the two.

The industry has some best practices for making sure employees and contingent workers know how to play an active role in helping keep the workplace and company data secure. Executives should recognizing that employees are the first line of defense in corporate security and, therefore, should cultivate a culture where security is top of mind and sets expectations for good security hygiene by helping employees know what actions to take.

Some examples include:

  1. Delivering more role-based information security training courses to the enterprise and providing annual Information Security Awareness training.
  2. Executing regular companywide information security awareness campaigns to engage employees and keep them connected to corporate information security and privacy policies, as well as the evolving security landscape.
  3. Enforcing compliance and managing change via targeted internal communications.

Keep in mind that all businesses need to take measures to help prevent attacks and have a set plan ready to go if one does occur. Across the board, NCSA recommends a top-down approach to creating a culture of cybersecurity in the workplace. The following steps ‒ developed by NIST ‒ will help tremendously as you formulate a plan to keep your business secure.

  • Identify: Conduct an inventory of our most valuable assets – the “crown jewels” of greatest importance to our business and of most value to criminals – such as employee, customer and payment data.
  • Protect: Assess what protective measures you need in place – such as keeping our software up to date or by following these tips – to defend the organization as much as possible against a cyber-incident.
  • Detect: Have systems set up that would alert you if an incident occurs, including the ability for employees to report problems.
  • Respond: Make and practice an incidence response plan to contain an attack and maintain business operations in the short term.
  • Recover: Know what to do to return to normal business operations after an incident or breach, including assessing any legal obligations.

Related Resources

BlogBlog

People Who Deliver: Spotlight Interview with Joe Brenneman

Enter go to Blog : People Who Deliver: Spotlight Interview with Joe Brenneman
BlogBlog

Securing Your Remote Worker

Enter go to Blog : Securing Your Remote Worker
BlogBlog

Helping our Hometown Recover and Rebuild...Again: Involta HQ City of Cedar Rapids Ravaged by Derecho Storm

Enter go to Blog : Helping our Hometown Recover and Rebuild...Again: Involta HQ City of Cedar Rapids Ravaged by Derecho Storm
BlogBlog

IT Starts with Security: Lessons from Healthcare Executives

Enter go to Blog : IT Starts with Security: Lessons from Healthcare Executives
BlogBlog

Digital Transformation: How do you “Get There?”

Enter go to Blog : Digital Transformation: How do you “Get There?”
BlogBlog

Digital Transformation: Why the Risk is Worth the Reward

Enter go to Blog : Digital Transformation: Why the Risk is Worth the Reward

Stay up to date with the latest from Involta

We use cookies to offer you a better web experience? By continuing to use our website, you agree to the Privacy Policy.