The Best Weapon Against Cyber Threats is People

When a company’s computers are hacked, management’s first impulses often are to invest in better software, better virus protection packages, better computers, or even entire networks.  But they may be putting the emphasis in the wrong place.  The problem’s root cause is usually not the technology, but people. Organizations that take a simplistic approach, assuming […]

Already an Subcriber? Log in

Get Instant Access to This Article

Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.

When a company’s computers are hacked, management’s first impulses often are to invest in better software, better virus protection packages, better computers, or even entire networks.

 But they may be putting the emphasis in the wrong place.

 The problem’s root cause is usually not the technology, but people. Organizations that take a simplistic approach, assuming computer hacks are an IT department’s problem are headed for trouble. Cybersecurity is everyone’s job.

 For lasting results, firms need to harness the power of solution-design techniques to develop cybersecurity systems and protocols, based on the I.D.E.A.S. framework:

• Identify: Get to the root cause of the problem. Step back, take a breath, and assess the situation, so that you will ensure you are treating not just the symptoms.

• Design To avoid security breaches, take time to determine the options that can be used to address all the problems related to these issues.

• Engage. Confirm that everybody who is impacted by a new cybersecurity program or effort is on board with the changes before they are implemented.

• Act. Implement mandatory training for all employees to explain the common ways that hackers enter the system, including how phishing works. 

• Sustain. Design metrics to keep cybersecurity policies in place and implement an easily accessible system for employees to identify and report incidents.

The company that truly engages all of its employees, suppliers, vendors and other stakeholders to be knowledgeable and aware of basic cybersecurity protocols will have a much better chance of countering criminals.       

J. Eduardo Campos and Erica W. Campos are co-authors of “From Problem Solving to Solution Design: Turning Ideas into Actions.” They are co-founders of the consulting firm, Embedded Knowledge Inc. (www.embedded-knowledge.com), which works with organizations and entrepreneurs to develop customized business strategies and to form partnerships focused on designing creative solutions to complex problems.

J. Eduardo Campos and Erica W. Campos

Recent Posts

Hochul releases guidelines for $500 million investment fund that’s part of Micron’s deal with the state

ALBANY, N.Y. — Gov. Kathy Hochul on Thursday released guidelines for pursuing funding in the…

1 hour ago

FuzeHub to use $1 million NSF award for program focused on advanced materials

ALBANY, N.Y. — FuzeHub says it will use a $1 million award from the National…

2 hours ago

Tompkins County seeks developer for emergency shelter

ITHACA, N.Y. — Tompkins County is looking for help designing and building an emergency shelter…

2 hours ago

Seneca Foods’ net sales slip 7 percent in latest quarter

FAIRPORT — Seneca Foods Corp. (NASDAQ: SENEA, SENEB) recently reported that its net sales for…

4 hours ago
Advertisement

Mower CEO Crockett named Chair of 2024 Walk to End Alzheimer’s

SYRACUSE — The Central New York Chapter of the Alzheimer’s Association recently named Stephanie Crockett…

4 hours ago

Binghamton University’s Center for Civic Engagement announces grants for seven community projects

BINGHAMTON — The Stephen David Ross University and Community Projects fund has awarded $28,300 in…

4 hours ago