Introduction
The word ‘holistic’ is one that is commonly used these days, especially in relation to approaches to healthcare. However, we can also use it to understand a wide range of awareness and behaviour, both on a computer and off that impacts the protection of data. In short, security awareness should be part of a holistic understanding of Information and Cyber Security, not a poor cousin that is relegated as less important, until a situation occurs where greater awareness could have protected or mitigated the impact. As someone who came into the profession via interest in security awareness, I have been cheered to see a growth in its incorporation into more mainstream information security.
That said, I think it is important to use this first chapter to both explain security awareness and consider where it fits with operational practices in organisations before we move on to look at the impact of working through COVID times has made. In doing so, I will also share some examples of where incidents, some well-known in the public domain, have demonstrated where relatively straightforward raising of security awareness would clearly reduce some significant, and in one case, very embarrassing impacts.
While much of this book is going to focus on the future, and how individuals and organisations can act now to become increasingly secure as time goes on, we need to understand where we came from if we are going to map out our route to security awareness moving forward.
Let’s start by talking about what we mean when we talk about security awareness.
First and foremost, we should acknowledge that ‘security awareness’ is a bit of a misnomer. It doesn’t accurately describe what we’re talking about, or even what we’re trying to do.
Start with the word ‘security,’ for example. This is a strong, concrete word that sends a clear message: after all to be secure is to be in a place of protection, often behind defences designed to keep threats at bay. It conjures images of strong walls and deep hidden vaults, dedicated to protecting valuable things. This makes sense to us as we think about the information we store. If data is precious, we think, then of course we should, to borrow a phrase, “keep it secret, keep it safe”.
So, what about ‘awareness’? Why do we need to be aware of security? After all, strong walls and deep vaults don’t need our constant attention to be secure! I think about this often and wonder what people think security professionals mean when we say they need to be aware of information security. Do they think we’re asking them to know who manages information security in their business, or know that information needs to be secure? Or do they think about their role in security as a process? After all, neither walls nor vaults can protect against threats if they are left open. Precious things might stop being safe, if they are not kept secret – and who knows what long road may lie ahead to fix a problem brought about by indiscretion. It reminds me of the Second World War adage; ‘loose lips sink ships’, because while the scale is different, the principle remains the same.
This is why security awareness needs to include an awareness of why a secure process is required in the first place. The “why” is important. I often find myself thinking about my children when I present this concept, drawn back into my memories of the toddler years where every other word out of their mouth seemed to be “why”. Why was the response to every instruction, every statement and every event large or small – whether I was prepared to answer it or not? Understanding the reasoning behind a rule can help children understand why it exists and help them to remember to do (or not do!) something whether their parent is in the room or not. Without the ‘why’, children can’t learn that they just shouldn’t do this thing or say that thing in front of a particular person, rather than that they shouldn’t do or say something in general. The same logic applies with security awareness – without understanding the ‘why’ of a particular policy or practice, staff may choose to ignore it as long as they’re out of sight, presenting a security risk in the process. This is even more important to think about now so many of us are working remotely, or in blended pattern, where we are often ‘out of sight’.
This doesn’t mean that the “why” questions around our security practices will always be comfortable or easy to answer. In fact, “why?” is one of the most difficult questions to prepare for, especially when we are trying to get people to change their behaviour, but we shut down that conversation at our peril. It is the why that helps staff understand the importance of their behaviour, and sometimes, the why that makes us think again about our own security practices by prompting us to think about something from a new, and unanticipated, angle.
So, making staff aware of security means not only educating them about the kinds of security in place but their role in it. There is no use in providing half of the information when people need to understand the why as well as the what. They need to understand the risk or threat and what they must do to recognise how important their own actions are in maintaining that security. This is traditionally achieved through formal, scheduled training: where a designated person takes on the role of communicating important rules and guidelines to staff in order to inform and empower them to work in a way that protects sensitive information. But this overt training isn’t the only option available, and there are several techniques that organisations can use to nudge, prompt or remind people to behave in the right way without interrupting their daily workflow. We’ll talk about some of these techniques in later chapters.
So, security awareness is about understanding that a threat or risk exists, knowing that there are steps that a person can take to help protect sensitive information and systems, and putting that knowledge into practice. Laying it out this way makes security awareness sound simple, or at least straightforward; identify a threat and build a defence to counter it, but things are rarely so clean in the real world. The fact you are reading in this book means you probably already know that. So what’s the problem? Why isn’t security awareness as straightforward in practice as it is in theory? One reason is the hidden complexity that hides between the steps of “identify the threat” and “the person takes preventive action”. Because, in fact, the sequence of events includes the identification of the threat, designing the defence, motivating the defender, and that defender acting to mitigate potential security risks.