{"id":16442,"date":"2019-09-26T11:01:04","date_gmt":"2019-09-26T19:01:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/09\/26\/news-10182\/"},"modified":"2019-09-26T11:01:04","modified_gmt":"2019-09-26T19:01:04","slug":"news-10182","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/09\/26\/news-10182\/","title":{"rendered":"Creating a Cybersecurity Culture for Your Digital Enterprise"},"content":{"rendered":"<p><strong>Credit to Author: Elizabeth Hackenson| Date: Thu, 26 Sep 2019 13:33:05 +0000<\/strong><\/p>\n<p>Each of us can recall at least one major cyber breach within the last few months. If you dig deep enough during the recovery phase, you\u2019ll find that the floodgate to the unseemly cyber underworld more often than not was opened by a single individual. In most cases inadvertently. It goes without saying that creating a strong cybersecurity culture is imperative for any digital enterprise.<\/p>\n<p>It takes only one unsuspecting person to launch a thousand ships, so to speak, and the average cost of a single data breach globally is $3.86 million.<a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a> Not to mention a company\u2019s reputation and customer confidence. Data breaches are just one business risk. In critical environments, worker and public safety is at risk as well. As IoT endpoints proliferate across the industrial ecosystem, the means of attack go beyond bad emails and malware. Today, every employee has a role to play in creating a sound cybersecurity culture that leads to digital trust.<\/p>\n<p><span style=\"color: #3dcd58\"><strong>Building a cybersecurity culture<\/strong><\/span><\/p>\n<p>How can you reboot your company\u2019s mindset to ensure cybersecurity thinking becomes second nature instead of a costly afterthought? <a href=\"https:\/\/www.schneider-electric.com\/en\/work\/services\/field-services\/industrial-automation\/industrial-cybersecurity\/industrial-cybersecurity.jsp\">Employee training is essential<\/a>.<\/p>\n<h3><span style=\"color: #3dcd58\">&#8220;At Schneider, we\u2019ve had great success in training our people and making cybersecurity part of our daily conversations&#8221;<\/span><\/h3>\n<p> <a href=\"https:\/\/twitter.com\/intent\/tweet?text=%22At%20Schneider,%20we%E2%80%99ve%20had%20great%20success%20in%20training%20our%20people%20and%20making%20cybersecurity%20part%20of%20our%20daily%20conversations%22%20Discover%20more%3A%20https%3A\/\/blog.se.com\/cyber-security\/2019\/09\/27\/creating-a-cybersecurity-culture-for-your-digital-enterprise\/%20%40SchneiderElec%20%23Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52576 size-full\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2018\/11\/CTA-Twitter.png\" alt=\"Twitter Button - Cybersecurity Culture by Elizabeth Hackenson\" width=\"200\" height=\"20\" \/><\/a> <\/p>\n<p>For example. As attackers get better and better at disguising attacks (e.g., phishing) and targeting individuals within companies (spear-phishing), ongoing training is a must. Only with education will employees be able to recognize these attacks and, more important, prevent them without really even having to think twice about doing so.<\/p>\n<p>For any employee to be a good cyber citizen, they need a solid understanding of what digital trust means to the company and to our shared global digital economy. Depending on their role, some employees may need a deeper understanding than others. But all should be thinking, \u201cIs cybersecurity and data privacy top-of-mind as I get my job done today?\u201d<\/p>\n<p>Also look for ways to make security easier for your employees. Strong passwords are table stakes; not having them is like leaving your front door open. But let\u2019s be honest \u2013 it\u2019s difficult for employees to remember multiple complex passwords for all their applications. A good solution is single sign-on, where one username and password get them into all their apps. (As an added bonus, it will also boost productivity, since employees won\u2019t be constantly shut out of applications and asking for password resets).<\/p>\n<p>Multi-factor authentication tools are also taking great steps forward, with the ability to use a phone as a token rather than a separate fob that may be lost or forgotten. Biometric-based authentication systems likewise make the process easier for employees; nobody forgets to bring their finger to work.<\/p>\n<p>And across R&amp;D, your global supply chain, and your lines of business, it helps to show simulated breaches via penetration tests. As soon as you can reveal to someone that you\u2019ve accessed their code, the conversation changes drastically. The intent here is not to have a \u201cGotcha!\u201d mentality but, instead, to work with the business teams as partners, fostering a \u201cwe\u201d culture instead of an \u201cus vs. them\u201d one.<\/p>\n<p><span style=\"color: #3dcd58\"><strong>Creating a \u201cwe\u201d culture for cybersecurity<\/strong><\/span><\/p>\n<p>Creating a cultural shift doesn\u2019t happen overnight. It requires a consistent drumbeat, not a one-time effort. Encourage employees to talk about security. As you bring groups together for regular meetings, spend five minutes talking about <a href=\"https:\/\/blog.se.com\/cyber-security\/2019\/03\/25\/3-lessons-from-it-security-for-industrial-cybersecurity\/\">cybersecurity<\/a>. Ask if anyone has any questions or concerns or has experienced anything suspicious. It doesn\u2019t have to be anything formal, but it\u2019s important to get conversations started and make it clear that it\u2019s OK \u2013 even encouraged \u2013 to share concerns, issues and problems.<\/p>\n<p>Examples of potential issues are all around us, and those employees on the front lines are in the best position to identify them. Many <a href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2019\/03\/25\/3-lessons-from-it-security-for-industrial-cybersecurity\/\">industrial control systems<\/a>, for example, are old \u2013 built before good password hygiene and secure control room operation were common. You can learn more about protecting legacy systems in our <a href=\"https:\/\/go.schneider-electric.com\/US_201909_Cybersecurity-Strategy-e-guide_EA-LP.html?source=Content&amp;sDetail=Cybersecurity-Strategy-e-guide_US\">\u201cBuilding a Cybersecurity Strategy\u201d<\/a> e-guide. Encourage employees to raise a red flag if they see a potential security flaw in such systems.<\/p>\n<p>Establishing this \u201cwe\u201d culture will help you to connect the dots across the company (as our CISO Christophe Blassiau discusses in his latest blog), find those weak links, and maintain always-on vigilance. If your organization can demonstrate that cybersecurity is ingrained in your culture, and that every employee is on-board, you can earn the valuable digital trust that\u2019s essential for advancing your <a href=\"https:\/\/www.schneider-electric.com\/en\/work\/campaign\/digital-transformation\/\">digital transformation<\/a> and success in the digital economy.<\/p>\n<p>&nbsp;<\/p>\n<p> <a href=\"https:\/\/go.schneider-electric.com\/US_201909_Cybersecurity-Strategy-e-guide_EA-LP.html?source=Content&amp;sDetail=Cybersecurity-Strategy-e-guide_US\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-60288\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2019\/09\/CTA-Blog_Cybersecurity-eguide-1.png\" alt=\"Link to the Cybersecurity e-guide\" width=\"560\" height=\"150\" srcset=\"https:\/\/blog.se.com\/wp-content\/uploads\/2019\/09\/CTA-Blog_Cybersecurity-eguide-1.png 560w, https:\/\/blog.se.com\/wp-content\/uploads\/2019\/09\/CTA-Blog_Cybersecurity-eguide-1-300x80.png 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a> <\/p>\n<p>&nbsp;<\/p>\n<h6><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> IBM Security, \u201cExamining the cost of a data breach 2018,\u201d July, 2018<\/h6>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/cyber-security\/2019\/09\/26\/creating-a-cybersecurity-culture-for-your-digital-enterprise\/\">Creating a Cybersecurity Culture for Your Digital Enterprise<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.se.com\/cyber-security\/2019\/09\/26\/creating-a-cybersecurity-culture-for-your-digital-enterprise\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elizabeth Hackenson| Date: Thu, 26 Sep 2019 13:33:05 +0000<\/strong><\/p>\n<p>Each of us can recall at least one major cyber breach within the last few months. If you dig deep enough during the recovery phase, you\u2019ll find that the floodgate&#8230;  <a href=\"https:\/\/blog.se.com\/cyber-security\/2019\/09\/26\/creating-a-cybersecurity-culture-for-your-digital-enterprise\/\" title=\"ReadCreating a Cybersecurity Culture for Your Digital Enterprise\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/cyber-security\/2019\/09\/26\/creating-a-cybersecurity-culture-for-your-digital-enterprise\/\">Creating a Cybersecurity Culture for Your Digital Enterprise<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[20593,12608,4500,23062,23063,23064,10495,714],"class_list":["post-16442","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-cyber-culture","tag-cyber-security","tag-cybersecurity","tag-digital-ecosystem","tag-digital-enterprise","tag-digital-trust","tag-iot","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16442"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16442\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}