Why people are not the weakest link
Though the data published by the ICO appears, on the face of it, to support the view that people are the ‘weakest link’ in the information security chain, this is a common misplaced trope.
Where people fail, it is more often than not they have not been given the right training and support to equip them to respond – people cannot be expected to grasp the entire threat landscape and proportionate behavioural response from an archaic 60-minute, annual, dull training experience.
People’s perception of risk and security has a big influence on the way they behave. For example, if someone has already been a victim of hacking or identity theft, they are far motivated to follow good practice simply to avoid the situation from happening again.
Also, because almost everything about cybersecurity happens online, it is kept hidden, which means there is a lack of ‘social proof’. This is a concept coined by renowned psychologist Robert Cialdini as one of six principles of influence that he examined. Simply put, it means that people will model the behaviours of others when they are uncertain about a situation. However, in the context of a cyber attack, most people do not have any point of reference. This is where simple and accessible security policies and processes show their value.
How policies and processes can enable sound security practices
Although the policies and processes in place need to be robust, they should not slow people’s productivity by making them follow draconian controls or cumbersome procedures. If you do, it can mean that they are tempted to bypass the security controls, which will leave you open to further threats.
As the UK’s National Cyber Security Centre (NCSC) puts it, “if a product has to be used in a particular way in order to be secure - but people cannot easily use it that way – the product is not secure in any meaningful sense”.
The NCSC’s blog offers tips to employers on what they can do to make security processes more usable, from streamline security policies to refining workflows behind everyday tasks.
In relation to policies, if these are too long then people can’t find the advice they require or understand the language that’s been used.
In addition, if the processes put in place by the security team are too cumbersome, people will seek alternative routes to get the job done. The workflow of a process is not always thought about, which means although it might make a system secure, the user experience is not frictionless which means people find it difficult or confusing to use. Organisations must learn from their people by asking for feedback on their policies and processes to strive for workable security.
The role of security professionals is to support and enable the business by managing risks while ensuring essential activities can continue. We must ensure that there is a balance between security and useability when creating our processes. For example, there is no point asking people to remember excessively long passwords as none of us have the cognitive ability to do this, and people will simply write them down, which will present an inherent security risk in its own right.