Blog

Cyber Security Week 3 - It's Everyone's Job to Ensure Online Safety at Work

10/26/2018

Week 3 of National Cybersecurity Awareness Month (NCSAM) has just wrapped up, and we want to shine a spotlight on helping everyone at work — from the break room to the boardroom — understand the importance of online safety. When you are on the job – whether it’s at your corporate office, a satellite location, or onsite with a client ‒ your organization’s online safety and security are a responsibility that everyone shares. And, as the lines between our work and daily lives become increasingly blurred, it is more important than ever to be certain that smart cybersecurity carries over between the two.

The industry has some best practices for making sure employees and contingent workers know how to play an active role in helping keep the workplace and company data secure. Executives should recognizing that employees are the first line of defense in corporate security and, therefore, should cultivate a culture where security is top of mind and sets expectations for good security hygiene by helping employees know what actions to take.

Some examples include:

  1. Delivering more role-based information security training courses to the enterprise and providing annual Information Security Awareness training.
  2. Executing regular companywide information security awareness campaigns to engage employees and keep them connected to corporate information security and privacy policies, as well as the evolving security landscape.
  3. Enforcing compliance and managing change via targeted internal communications.

Keep in mind that all businesses need to take measures to help prevent attacks and have a set plan ready to go if one does occur. Across the board, NCSA recommends a top-down approach to creating a culture of cybersecurity in the workplace. The following steps ‒ developed by NIST ‒ will help tremendously as you formulate a plan to keep your business secure.

  • Identify: Conduct an inventory of our most valuable assets – the “crown jewels” of greatest importance to our business and of most value to criminals – such as employee, customer and payment data.
  • Protect: Assess what protective measures you need in place – such as keeping our software up to date or by following these tips – to defend the organization as much as possible against a cyber-incident.
  • Detect: Have systems set up that would alert you if an incident occurs, including the ability for employees to report problems.
  • Respond: Make and practice an incidence response plan to contain an attack and maintain business operations in the short term.
  • Recover: Know what to do to return to normal business operations after an incident or breach, including assessing any legal obligations.

Related Resources

BlogBlog

Cloud Transformation: How and When to Make the Move

Enter go to Blog : Cloud Transformation: How and When to Make the Move
BlogBlog

People Who Deliver: Spotlight Interview with Involta's VP of Sales, Eastern Region

Enter go to Blog : People Who Deliver: Spotlight Interview with Involta's VP of Sales, Eastern Region
BlogBlog

Transformation and Growth Require That MDR Can Scale

Enter go to Blog : Transformation and Growth Require That MDR Can Scale
BlogBlog

Backup and Recovery: Safeguard Your Data

Enter go to Blog : Backup and Recovery: Safeguard Your Data
BlogBlog

Is the Future a Dangerous Place for Business?

Enter go to Blog : Is the Future a Dangerous Place for Business?
BlogBlog

Involta Launches Operation Linking Loved Ones

Enter go to Blog : Involta Launches Operation Linking Loved Ones

Stay up to date with the latest from Involta

We use cookies to offer you a better web experience? By continuing to use our website, you agree to the Privacy Policy.