Industrial manufacturing
Industrial Internet of Things | Industrial materials | Equipment Maintenance and Repair | Industrial programming |
home  MfgRobots >> Industrial manufacturing >  >> Manufacturing Technology >> Industrial Technology

Building a Strong Security Culture Across Your Organization

Building a Strong Security Culture Across Your Organization

October is National Cybersecurity Awareness Month.

It also happens to be (among other things) Breast Cancer Awareness Month, Dental Hygiene Month, National Bullying Prevention Month and my personal favorite, National Pizza Month. Plus, it’s Halloween! But I digress…we’re here to talk about cybersecurity.

Every manufacturer should hold cybersecurity awareness training for all their staff at least once a year. Many people are spooked by the mere mention of the words “cybersecurity” and “training,” so October seems like an appropriate time for it. Your training should, at a minimum, cover relevant company policies such as your IT security, information security, and physical security.

Over the years many of us have taken this type of training and learned to dread it. Training where someone gives the exact same cybersecurity speech they gave last year and then hands out a paper for you to sign saying you were there. A real snoozefest. This kind of training does its job as far as meeting the bare minimum but has little impact on actually molding employee behavior.

The real purpose of cybersecurity awareness and training efforts should be to create a culture of security, meaning that employees should view good cybersecurity practices as good business and as part of “how we do business here.” Employees should feel enabled to make good cybersecurity decisions and understand what makes a good decision. Awareness and training should focus on:

Ideally, training should be a continuous effort. Some ideas on how to include cybersecurity training in the everyday workings of your business include:

There has been a lot of research into what good employee cybersecurity training looks like. In general, it can be summed up using the acronym “RAINSTORMS.” Yes, I just made that up right now.

The National Initiative for Cybersecurity Education (NICE) has a small list of free and low-cost resources to help with employee training. There are also many additional resources available online. Just do an internet search and you’ll be bombarded with options. Evaluate those options using the RAINSTORMS template above.

Throughout the month of October, NIST MEP will be posting a series of blogs loosely following the theme and outline provided by the National Cybersecurity Alliance (NCSA). The theme for this year is “Do Your Part. #BeCyberSmart.” Now, personally, I’ve never been a fan of self-promoting a hashtag, but if you tweet or blog about cybersecurity during this month, consider using the #BeCyberSmart hashtag – we’ll see how far it goes.

The outline the NCSA has put out is as follows:

Not sure where to start? You can learn more about how to implement an effective cybersecurity training program by contacting your local MEP Center. You can also access cybersecurity resources for manufacturers on the NIST MEP website.

 

This blog is part of a series published for National Cybersecurity Awareness Month (NCSAM). Other blogs in the series include If You Connect It, Protect It by Zane Patalive, Suspicious Minds: Non-Technical Signs Your Business Might Have Been Hacked by Pat Toth, Securing Internet-Connected Medical Devices by Jennifer Kurtz and The Future of Connected Devices by Erik Fogleman and Jeff Orszak.


Industrial Technology

  1. Why Cloud Security Is the Cornerstone of Modern Cyber Defense
  2. Ransomware Accelerates the Industrial Cybersecurity Transformation
  3. Retrofitting Cybersecurity: Safeguarding Legacy Industrial Systems in the IIoT Era
  4. 5 Essential Questions to Ask Your Cybersecurity Professional
  5. Cisco's Five-Step Blueprint for Robust Third-Party Cybersecurity
  6. 10 Essential Steps to Secure Your Supply Chain: A Proven Cybersecurity Playbook
  7. Protect Your Home: Secure IoT Security Cameras from Cyber Threats
  8. Claroty’s Cybersecurity: Why Industrial Supply Chains Demand Even Greater Protection Than Data Security
  9. Top 10 Cybersecurity Firms Protecting the Manufacturing Industry
  10. Developing a Robust Cloud Security Policy