UK businesses still overlooking human element in security
Only four in 10 (42%) businesses focus on compliance training as part of cyber security efforts to ensure sensitive data is kept secure, despite the fact that accidental lapses in security through carelessness or negligence are responsible for a significant proportion of security breaches, a report has revealed.
More worryingly, 63% rely predominantly on passwords to protect IT systems, according to a whitepaper on the link between personality types and vulnerabilities to cyber crime by security firm Eset and business psychology organisation the Myers-Briggs Company.
The whitepaper, based on a survey of 500 UK firms, highlighted that cyber security should be on every boardroom’s agenda and that there need to be ongoing one-on-one meetings and training sessions to highlight and mitigate potential vulnerabilities within teams.
“It is vital that modern businesses have a degree of self-awareness regarding cyber security,” the whitepaper said. “That is, not just a general awareness of the problem, but detailed and personalised knowledge of how cyber crime and cyber security relate to their own operations.” It noted that the most successful cyber attacks typically rely on a degree of human error and/or ignorance.
The whitepaper also highlighted popular cyber threats, such as formjacking, PowerShell-based attacks and attacks exploiting weaknesses in IoT (internet of things) devices.
Cyber criminal techniques are extremely diverse and unpredictable, the report said, noting that aside from a reputable and trustworthy cyber solution, having a solid front line of employees who are armed with ample information and support is critical for businesses.
“Securing the human element is vital in today’s fast-changing cyber landscape,” said Jake Moore, security specialist at Eset. “We are seeing a growing need for companies to streamline their teams’ cyber safety protocols.”
While the motivation behind a cyber attack may be varied and impossible to predict, the whitepaper said companies can take the time to learn more about their employees’ personalities and behavioural preferences to help them understand the role they play in securing company data.
“For the human risk factor to be mitigated, both senior and middle management need to play a much larger role in both identifying vulnerabilities within their teams and securing cyber systems via an integrative human/machine approach,” the whitepaper said.
Research collated by the Myers-Briggs Company that looked at individuals across Europe revealed that people who focus their attention on the outside world (extraverts) are more vulnerable to manipulation and persuasion by cyber criminals.
In contrast, people who tend to observe and remember details may be better suited to spotting risks as they arise, while people guided by personal values or who are systematic or structured are more likely to fall victim to social engineering attacks than those who solve problems with logic.
However, people who have a preference for thinking can over-estimate their own competence, leading to mistakes, the researchers warned.
Identifying people’s potential strengths and weaknesses not only highlights how different team members may be at risk without even knowing it, but it can also be used to foster a collaborative team dynamic as members may call on each other’s strengths, the whitepaper said.
“Despite the risks involved, cyber security is something many businesses leave up to dedicated IT specialists, when in fact a lot of breaches could be avoided if a more integrated and business-wide approach to cyber security were adopted,” it said.
John Hackston, head of thought leadership at the Myers-Briggs Company, said: “When it comes to cyber safety protocols, we strongly advocate delivering a personalised cyber security management programme to employees.
“We believe that when employees are aware of their potential blind spots, they are naturally more invested and better prepared to be wary of things that may not seem quite right.
“By improving employees’ self-awareness, employers can maximise individual and team performance. This is particularly important in a fast-moving industry like cyber security, which combines constantly shifting challenges with the need to place trust in individuals.”
Industry: Cyber Security
- Contact 12 month- Security Operations- Crowdstrike Falcon Insight EDR / Analyst.
- United Kingdom
- Dependent on experience
Security Operations engineer / Analyst with Crowdstrike Falcon Insight EDR experience for a 12 month contract. Experienced Contractor with Crowdstrike Falcon Insight: Endpoint detection and Response (EDR) experience needed - 12 month rolling project. Implementation, configuration and Analyst experience needed with Crowdstrike Falcon Insight: (EDR) Migration project- relocating capability internationally. technically implementing, configuration of that that migration and then transition to BAU role monitoring. DCL Search exclusive associate Project.
- SailPoint Consultant
- Upto £75,000 plus benefits
SailPoint Consultant is needed for an expanding Financial Service business, this is an exciting time to join the Business as they are in the Process of deploying both IAM and PAM solutions and this consultant will form a key part of the IAM team Location can be flexible but would require the individual to come into the London office a couple of times a month for team meetings and face to face project reviews Duties include · Engage in the Identity & Access Management project to deliver SailPoint IdentityNow and Privileged Access Management · On-board applications and users into IAM tools and customise or configure integrations as required · Regularly review, secure and recertify privileged roles in applications, databases and operating systems · Implement least privilege, just-in-time access, password rotation and vaulting wherever possible · Migrate application authentication to Single Sign-On through the use of SAML and OAuth · Implement and enforce the use of MFA where possible, focusing on critical applications and risky sign-ins · Provide technical support to Centrify and SailPoint users Key experience required: Previous experience with SailPoint, including integrating and deploying into a business, onboarding users and applications, supporting users and performing manual administration tasks. Experience with SAML and OAuth to migrate applications to Single Sign-on. If you are interested in hearing more please reach out to me for more information
- Centrify Consultant
- Upto £75,000 plus benefits
A Privileged Access Management Consultant is needed for an expanding Financial Service business, this is an exciting time to join the Business as they are in the Process of deploying a Centrify PAM solution,, this consultant will form a key part of the team Location can be flexible but would require the individual to come into the London office a couple of times a month for team meetings and face to face project reviews Duties include · On-board applications and users into PAM tools and customise or configure integrations as required · Regularly review, secure and recertify privileged roles in applications, databases and operating systems · Implement least privilege, just-in-time access, password rotation and vaulting wherever possible · Migrate application authentication to Single Sign-On through the use of SAML and OAuth · Implement and enforce the use of MFA where possible, focusing on critical applications and risky sign-ins · Provide technical support to Centrify users You would also gain expsoure with the IAM toolset as part of an Identity Access deployment. Key experience required: Previous experience with a PAM tool (Centrify would be an added bonus but not essential) including integrating and deploying into a business, onboarding users and applications, supporting users and performing manual administration tasks. Experience with SAML and OAuth to migrate applications to Single Sign-on. If you are interested in hearing more please reach out to me for more information
- SOC team lead- Deputy SOC manager - Managed Security Services, Bradford. Exclusive
- £70,000 +
SOC team lead- Deputy SOC Manager - Managed Cyber Security Services, Bradford. Exclusive Identifier project. Technical team lead needed to join a Managed Cyber Security Services business. The role will be a hands on lead role and technical escalation point for the team. You will also be responsible for leading, mentoring, growing and developing the team. You will be the deputy SOC manager and be involved in the strategic growth of the capability. A managed security services background is essential, specifically within a managed security operations capability. Current hands on support experience across Firewall, SIEM, Incident Response is essential.