Blog

Cyber Security Week 3 - It's Everyone's Job to Ensure Online Safety at Work

10/26/2018

Week 3 of National Cybersecurity Awareness Month (NCSAM) has just wrapped up, and we want to shine a spotlight on helping everyone at work — from the break room to the boardroom — understand the importance of online safety. When you are on the job – whether it’s at your corporate office, a satellite location, or onsite with a client ‒ your organization’s online safety and security are a responsibility that everyone shares. And, as the lines between our work and daily lives become increasingly blurred, it is more important than ever to be certain that smart cybersecurity carries over between the two.

The industry has some best practices for making sure employees and contingent workers know how to play an active role in helping keep the workplace and company data secure. Executives should recognizing that employees are the first line of defense in corporate security and, therefore, should cultivate a culture where security is top of mind and sets expectations for good security hygiene by helping employees know what actions to take.

Some examples include:

  1. Delivering more role-based information security training courses to the enterprise and providing annual Information Security Awareness training.
  2. Executing regular companywide information security awareness campaigns to engage employees and keep them connected to corporate information security and privacy policies, as well as the evolving security landscape.
  3. Enforcing compliance and managing change via targeted internal communications.

Keep in mind that all businesses need to take measures to help prevent attacks and have a set plan ready to go if one does occur. Across the board, NCSA recommends a top-down approach to creating a culture of cybersecurity in the workplace. The following steps ‒ developed by NIST ‒ will help tremendously as you formulate a plan to keep your business secure.

  • Identify: Conduct an inventory of our most valuable assets – the “crown jewels” of greatest importance to our business and of most value to criminals – such as employee, customer and payment data.
  • Protect: Assess what protective measures you need in place – such as keeping our software up to date or by following these tips – to defend the organization as much as possible against a cyber-incident.
  • Detect: Have systems set up that would alert you if an incident occurs, including the ability for employees to report problems.
  • Respond: Make and practice an incidence response plan to contain an attack and maintain business operations in the short term.
  • Recover: Know what to do to return to normal business operations after an incident or breach, including assessing any legal obligations.

Related Resources

BlogBlog

The Next Generation of Networks

Enter go to Blog : The Next Generation of Networks
BlogBlog

Involta Cares: Spotlight Interview with Olivia Bontrager

Enter go to Blog : Involta Cares: Spotlight Interview with Olivia Bontrager
BlogBlog

Anywhere Operations Means Business as Usual

Enter go to Blog : Anywhere Operations Means Business as Usual
BlogBlog

Your Digital Workplace with Microsoft Teams Q&A Recap

Enter go to Blog : Your Digital Workplace with Microsoft Teams Q&A Recap
BlogBlog

People Who Deliver: Spotlight Interview with Weston Shultz

Enter go to Blog : People Who Deliver: Spotlight Interview with Weston Shultz
BlogBlog

Ransomware: The Monster to Watch Out For

Enter go to Blog : Ransomware: The Monster to Watch Out For

Stay up to date with the latest from Involta

We use cookies to offer you a better web experience? By continuing to use our website, you agree to the Privacy Policy.