none

NOBODY IS TAKING YOUR SECURITY POLICY SERIOUSLY

10-05-2017
by 
in 

So, you’ve got a new security policy in place. Maybe you read the Industry Update security features and took their advice, or maybe your IT team insisted you make sure your business was secure.

Either way, you’ve got a brand new set of rules for your business to follow, and you don’t have to worry about losing data, getting ransomware, or having information stolen. Right?

Wrong, unfortunately. Despite all your hard work, you still haven’t removed the #1 cause of technological errors and security breaches: your employees.

To be fair, firing all your employees because you’re worried about tech security is a slight overreaction. But the fact remains that no matter how comprehensive your new policies are, employees will always find a way around the rules if they are inconvenient enough.

If your security rules are making it harder, more time-consuming, or more boring to get a job done, you can guarantee that the offending steps are going to be skipped at least once a week. It won’t be malicious, and likely the employee won’t think twice about what they’re doing. Doubtless it will seem perfectly reasonable from their point of view.

How do we get around this problem? The immediate reaction is to add more rules, more checks, and make it harder for employees to skip any part of the security checks. This, however, can cost more (in terms of time and morale) than it saves, and it’s not even guaranteed to close all the loopholes. What to do?

1: Clarity

This may seem obvious, but your employees need to know what the rules are. They need to know, quickly and easily, what websites are okay to use, what devices are okay to connect, and what to do with removable storage devices. Make sure your rules are simple, clear, and easy to find.

2: Enforcing

While over-zealously policing every tiny rule infraction will hurt morale, making sure that employees don’t do what they’re really not supposed to is important. If a website is not to be visited at work, ensure it’s blocked properly. If personal devices aren’t supposed to be connected to work computers, take action when anybody connects one, no matter who they are or how long it’s connected.

3: Accomodate

Listen to the needs of your employees and adapt your rules. They need to do their jobs, and if your rules are blocking functions of their jobs, they’ll find a way around them that most likely won’t be secure. If they’re saying “we need to do X”, then find a way to make it happen.

4: Explain

Your employees also need to know why they’re following a certain set of rules. From their point of view, it might all seem irritating, obscure, and completely unhelpful, but the rules have a purpose. Make sure that explanations for each of your rules are clearly explained, and if you can, provide plausible examples of issues that occur when the rules are not followed.

5: Adapt

There are going to be breaches, mistakes, or deliberate avoidance of the rules. It’s going to happen, so the only sensible thing to do is plan for these occasions. Any robust security plan is prepared to deal with inevitable user-end errors and security flaws.

We cannot, unfortunately, expect perfect security. But with time, and practice, we can come fairly close.

Related news & editorials

  1. 15.08.2018
    15.08.2018
    by      In
    BHP’s new $4.8 billion South Flank iron ore mine in the Pilbara is expected to create about 2500 jobs during construction and 600 ongoing roles. But local fabricators are quire rightly up in arms about the company’s decision to award the contract for 20,000 tonnes of structural steel work to... Read More
  2. 14.08.2018
    14.08.2018
    by      In
    The former Trade Commissioner of Denmark to Australia and New Zealand, Michael T Hansen has been named General Manager of Nilfisk in Australia.
    Originally from Denmark, Hansen has more than 25 years of experience in business development and sales.
    Over the last 9 years as Trade Commissioner, Hansen... Read More
  3. 14.08.2018
    14.08.2018
    by      In
    World-renowned physicist Dr Cathy Foley has been named CSIRO Chief Scientist with a brief to help champion science, its impact and contribution to the world. Dr Foley is best known for her work developing superconducting devices and systems that have assisted in unearthing over $6 billion in... Read More
  4. 14.08.2018
    14.08.2018
    by      In
    Australian industry is cleaning up its act – both figuratively and literally, with the trend towards more eco-friendly cleaning techniques gathering pace in recent years. And as a company that has pioneered some of the greatest advances in this field, Tennant finds itself in the perfect position to... Read More