Making cybersecurity a bonus, not a burden
One of the biggest challenges of an effective cybersecurity strategy is ensuring that employees buy in and take it seriously. This requires striking a balance between effective cybersecurity and allowing employees to do their jobs efficiently, because if they’re constantly having to jump through cybersecurity hoops, eventually they’ll look for workarounds or other ways to make it less of a burden.
“Security that is too onerous is typically poor security, because people will work harder to circumvent the rules than to comply,” says Tommey.
He offers the example of logins. While best practices call for individual logins and passwords for all users, many plants have logins for roles, not users. Instead of “FirstName LastName,” it’s “operator” or “maintenance.” Moving to individual logins offers better security, but is one more username and password for employees to remember. So, one option is to use employee badges with RFID to login, and then a PIN if it is required for two-factor authentication. Because swiping a badge and typing in a pin will be perceived as easier than typing in a username and password, employee reluctance to move to individual logins will be reduced.
This and similar solutions, such as offering employees access to password managers, can offer technological solutions to a people problem. Resistance will always be a challenge, because employees become set in their ways or don’t want to learn one more new way of doing things. But if you can offer them a solution that is secure and efficient, they will be more likely to adopt it because they view it as a positive step instead of an additional hindrance to being able to do their jobs.
“We know that behavior is learned,” says Livingston. “What we mean by that is every change experiences pushback because users say it will negatively impact productivity. But the reality is that humans learn and adapt quite quickly.”
But there is an important consideration to keep in mind when it comes to employee productivity, and it is that productivity can’t completely override security. Remote access is one example. While it does have productivity benefits and can remove a lot of headaches for managers or maintenance personnel by allowing them to take care of an issue from home instead of having to come back into the plant after their work day is done, it’s a potential security issue. It becomes even more pronounced as employees look for ways to develop workarounds in the name of productivity or efficiency, as devices that are meant to be secure are placed on networks or short-term solutions end up lasting indefinitely because nobody bothers to remove them.
“The dreaded ‘air gap’ or ‘isolated’ network that so frequently is the basis of security protections often doesn’t exist in reality once you dive into the details of the network and remote accessibility,” says Livingston.
The bottom line
When it comes to cybersecurity, both people and technology play a role. But while technology offers things people can’t, it’s only as good as the people operating it and using it in the way it is intended instead of looking for workarounds or shortcuts.
That means you need employee buy-in and commitment to making your cybersecurity policies and procedures work. Doing so requires a combination of good training; clear, realistic expectations; and an understanding that there’s no such thing as a one-time cybersecurity solution. As threats evolve, so must your cybersecurity approach, and employees have to stay abreast of new solutions and be willing to implement them in an effective way.
“The biggest thing is that cybersecurity is never static,” says Tommey. “Everything involved with cybersecurity is always changing and evolving—the threats change, the people using, protecting, and attacking change, the systems change, the applications change. So, the only way a company can keep up is with a continuous improvement style approach.” FE