Over-30s tend to do better at cyber security than younger colleagues
Brits over the age of 30 tend to be more likely to adopt best practice when it comes to cybersecurity than their younger colleagues, even though the under-30s tend to be more anxious about security matters, according to a study conducted by NTT’s cyber unit.
The study, which also looked into the attitudes of people in multiple other countries, was conducted as part of NTT’s Risk: Value report 2019 and scored across 17 criteria. In the UK, over-30s scored higher in terms of security best practice than the under-30s. When compared with people in the other countries studied, which included Brazil, France, Hong Kong and the US, people in the UK tended to score higher regardless of age.
The study cannot be read as an indictment of the habits of millennials (those born between approximately 1980 and 1995) because the oldest millennials are now approaching the age of 40. However, its findings do clearly show that just because people have grown up as digital natives and are aware of the risks of life online, it does not necessarily mean they are paragons of virtue when it comes to security.
Indeed, suggested NTT, employees who have spent longer in the workplace gaining knowledge and skills – what it termed “digital DNA” – have a clear advantage over their younger colleagues.
“It’s clear from our research that a multigenerational workforce leads to very different attitudes to cybersecurity. This is a challenge when organisations need to engage across all age groups, from the oldest employee to the youngest,” said NTT Security’s vice-president of consulting for the UK and Ireland, Azeem Aleem.
“With technology constantly evolving and workers wanting to bring in and use their own devices, apps and tools, business leaders must ensure that security is an enabler and not a barrier to a productive workplace.
“Our advice for managing security within a multigenerational workforce is to set expectations with young people and make security awareness training mandatory. Then execute this training to test your defences, with all company employees involved in simulation exercises,” said Aleem.
“Finally, teamwork is key. The corporate security team is not one person, but the whole company, so cultural change is important to get right.”
The research revealed that under-30s expected to be more productive, flexible and agile at work using their own tools and devices, but half thought that responsibility for security rested solely on the shoulders of the IT department – 6% higher than older age groups.
One anonymised interviewee, a 28-year old working in the finance sector, commented: “I don’t think I care anymore. There is so much stuff out there now, what with Cambridge Analytica. It is all out there, I accept that at some point someone might try to defraud me and impersonate me and I will deal with it when it happens, I suppose.”
The report seemed to show younger workers were more ready to take risks – 52% said they’d consider paying a ransomware demand, compared with 26% of over-30s. But 58% believed their employers did not have the right in-house skills or resources to cope with the number of security threats, compared with just 26% of older adults.
Younger people also tended to dramatically underestimate the amount of time it would take to recover from a cybersecurity breach and were less likely than their older colleagues to believe cyber should be a regular item on the boardroom agenda.
However, younger people did consider the internet of things (IoT) as a greater security risk than the over-30s.
Adam Joinson, professor of information systems at the University of Bath – who specialises in the intersection of IT and human behaviour – said that if the report made anything clear, it was that there is no such thing as a one-size-fits-all approach to security.
“The insights from the NTT study demonstrate that treating all employees as posing the same risk, or having the same skills, is problematic for organisations. We do need to be careful not to assume that the under-30s simply don’t care so much about cybersecurity. While this may be true in some cases, in others it is more likely that existing security policies and practices don’t meet their expectations about ‘stuff just working’,” he said.
“If we want to harness the fantastic creativity and energy of younger workers, we need to think about security as something that enables their work, not something that blocks them from achieving their tasks. This is likely to mean security practitioners having to fundamentally rethink the way security policies operate and find ways to improve the fit between security and the tasks employees are required to undertake as part of their core work,” added Joinson.
To this end, NTT has produced a checklist of six best practice tips to reinforce security in a multigenerational workforce. These are to:
- Make security culture inclusive of all age groups and supported by age-diverse “champions”.
- Listen to the views of younger employees on cyber.
- Enable agile and flexible workplaces that help younger people buy into the desired security culture.
- Make security leaders approachable to everyone in the business.
- Support learning programmes, mentoring and even external support in areas where skills shortages are most acute.
- Educate, possibly even through tactics such as gamification.
- Critical Facilities M&E Shift Lead
Critical Facilities M&E Shift Lead A Critical Facilities Shift Lead is needed for a niche, ultramodern Data Centre business in Hertfordshire. The Critical Facilities Shift Lead will be responsible for leading a team of shift engineers and sub-contractors and providing high-level engineering support on M&E / Mechanical & Electrical Data Centre equipment Other responsibilities include but not limited to; Maintenance and Improving current facilities/equipment. Health & Safety Operational Activities Providing Critical engineering best practice processes and procedures Requirements include; Current and considerable experience in a management role within an M&E/Data Centre/Data Center business or in a critical environment Electrical Engineering Degree / HNC / HND UK Based commutable to Hertfordshire – Sponsorship cannot be supplied to Non-EU Candidates. Salary: Competitive Location: Hertfordshire Ref PG7678
- Data Centre Change Manager
Data Centre Change Manager A Data Centre Change Manager is needed for a niche, ultramodern Data Centre business in Hertfordshire. The Data Centre Change Manager will be responsible for supervising and implementing change & permit management with the UK to help decrease/nullify potential incidents. Other Responsibilities include but not limited to; Audit & Risk Assessment or current change and permit processes Accepting & Dismissing changes Escalation Support Internal training to increase change & permit awareness Requirements include; Current and considerable experience in a change management role with a Data Centre/Data Center business or in a critical environment. It would be extremely beneficial to hold an ITIL qualification. UK Based commutable to Hertfordshire – Sponsorship cannot be supplied to Non-EU Candidates. Salary: Competitive Location: Hertfordshire Ref PG7677
- Channel Account Director
- Up to £75,000 + Double OTE
One of the fastest-growing IT managed service providers in London are looking for a Channel Account Director. The Channel Account Director will be responsible for managing some of their largest UK based accounts. Requirements Working for an IT managed services business selling a combination of Connectivity, UC, Cloud or Security into channel customers Consistency of tenure in current and recent job roles Current experience solely managing a multimillion-pound account. Commutable to London In return, you will be working for a growing & highly successful SME organisation with excellent sales support from pre-sales, post-sales, project management, service management, bid management, pricing and customer service. Candidates must be UK Based. Sponsorship is not available for Non-Eu Candidates. Ref BD7675 Salary: Up to £75,000 + Double OTE (Telecommunications Jobs, Telecoms Jobs, Channel Sales Jobs, Cloud Jobs, Cloud Computing Jobs, Cloud Sales Jobs)
- Cyber Incident Response Consultant (DFIR)
- Up to £70,000 Base
Cyber Incident Response Consultant (DFIR) is needed to join a global consultancy to focus on leading the Incident response capability in the UK. The team are actively growing, are globally recognised and work on varied, high profile and interesting projects. Given the nature of the role, this individual must be available and happy to travel. The Cyber Incident Response Consultant (DFIR) will have a blend of technical hands-on and client-facing consultancy. Any mentorship experience is always desirable. In-depth technical experience is a must; specific experience working with clients in the ‘eye of the storm’ of an incident is essential. APT, active threat hunting, IR triage/planning experience is critical. Just as important is the ability to coordinate the response across multiple client stakeholders, team members and other team members; such as Legal, PR. It is essential that the Cyber Incident Response Consultant (DFIR) is able to identify, scope, manage, remediate/eradicate the threat for the clients. Any previous experience in identifying and generating revenue is obviously valued, but not essential. A broad forensic background would be highly desirable also. An ideal candidate will be CREST CCIR, CCIM certified, Key attributes should also include; stakeholder engagement, mentoring of team members, a collaborative working style. Technical experience must include; demonstrable experience within cyber incident response, Forensic, cyber etc. Additional certifications could / should include GIAC certified (Intrusion analyst, incident handler, forensic handler) Career development and the opportunity to influence, apply today for more information or call Chris Holt on 07884666351 firstname.lastname@example.org Ref CH7625 Candidates must be UK Based. Sponsorship is not available for Non-Eu Candidates.