7 Tips to Enhance Cybersecurity Awareness in Your Organization

March 8, 2018

By Blaise Wabo

A recent study has shown that the average size of a data breach has increased 1.8 percent to more than 24,000 records since 2016. It is now more important than ever to implement preventative measures to help mitigate the risk of cyber attacks and train employees on cybersecurity best practices.

The weakest link is often not the technology itself, but the users who can unknowingly cause a security incident through events such as opening a phishing email or allowing a visitor on-site without checking their access. Due to these risks, organizations must invest in their employees by teaching them how to prepare for, prevent and respond to these risks as they arise. Here are seven tips for enhancing and educating your employees on cybersecurity awareness.

1. Education from the Top Down

This is number one for a reason. Individuals in management may think that because they have an incredible IT Security Director at the helm, their duties regarding risk mitigation are fully out of their hands. However, ensuring that management and employees fully understand the potential cybersecurity risks innate to your organization is important in preventing attacks.

The development of policies and procedures on how to prevent data breaches is essential, and educating employees both new and old on these policies and procedures is critical. Because the cybersecurity landscape is constantly changing, regularly educating management and employees on updated cybersecurity policies and procedures is important in mitigating risk. In addition, your organization should inform employees on new scams or potential new risks as they arise—for example, new phishing scams or websites with potential vulnerabilities.

2. Social Engineering and Phishing Scams

Typically, there are a few details that can indicate that an email or website may not be coming from a legitimate source. These tells include poor spelling and grammar, abnormal sender, and unfamiliar URLs. Also, abnormal requests such as an unanticipated account verification can also indicate that an email is part of a phishing scam. Verify the source before making a click.

3. Change Your Passwords Periodically

Do you use the same password across all of your accounts and devices? In the event your account is compromised, utilizing the same password across platforms makes it easy for hackers to access your information. Additionally, not changing password defaults immediately is a serious vulnerability that can compromise your system if not changed, as they tend to be the same across all systems and accounts. This lack of oversight can damage the security of a system. 

New rules for creating passwords were announced by the National Institute for Standards and Technology (NIST), which include having a password between 8-64 characters long, and using longer phrases that are easier to remember. Furthermore, you can implement two-factor authentication. This will provide a secondary form of authentication outside of your typical password, which will strengthen your security.

4. Verify Sites

Before conducting any activity on a site, users need to make sure that the site is secure. You can check to see if the site is using a secure certificate and employing SSL (Secure Socket Layer) to secure your data in transit. This can often be done by looking at the address bar in your internet browser. Google Chrome users can often see a little lock that will show whether a site is using SSL by displaying a green lock to the left of the web address. Look for the lock!

5. Disable Automatic Wi-Fi and Bluetooth Connection

When you are in public, your phone and computer can automatically connect to an unsecured WiFi or mobile hotspot. In addition, it might connect to other devices through your Bluetooth capability. Be sure to disable this auto-connection feature on your phone to ensure you are safeguarding your personal information and to keep hackers at bay.

6. Always Secure Your Devices

Your device, whether it’s your computer, tablet, or phone, contains valuable, sensitive information. It’s important to always lock your device when you are away from it, to prevent hackers from having access. Additionally, implementing two-factor authentication (as noted in tip three) will increase the security of your devices when you are away.

7. Be Conscientious about What You Are Sharing

This might be an obvious one, but people tend to share sensitive information without realizing it. A hacker can use information like your birthday, address, where you work, and even pictures of your family to compromise your account. Consequently, the more information a hacker has on you, the easier it is for them to steal your identity.

Making Sense of the Information Security Tips

Managing cyber-risk is a multi-faceted, organization wide effort that requires implementation at the top levels down. With these seven information security tips in mind, you can protect your personal information and identity to prevent a data breach from occurring in your organization. For more information regarding cybersecurity and data protection, review The Ultimate Cyber Defense Guide to educate employees on the data breach landscape and cybersecurity best practices.

Blaise Wabo is a managing consultant at A-LIGN, which focuses on performing SSAE 16, SOC 2 and ALTA Best Practices certifications in the title insurance and settlement industry. He can be reached at blaise.wabo@a-lign.com or 888-702-5446 x129

Contact ALTA at 202-296-3671 or communications@alta.org.

North American Title Insurance Company (NATIC) is a seasoned title insurance underwriter, helping title agents to achieve their individual business goals for more than 50 years. Today, the company conducts real estate settlement services in 39 states and the District of Columbia through a network of experienced, independent agents.