Story image

General staff don’t get tech jargon - expert says time to ditch it

16 May 2019

In a world where massive breaches seemingly surface on a weekly basis, businesses are scrambling to get their cybersecurity up to scratch.

Most of these breaches come from human error, according to Embedded Knowledge co-founder – and co-author of 'From Problem Solving to Solution Design: Turning Ideas into Actions' - J. Eduardo Campos, who asserts there can be a simple solution to many of these instances.

An office memo that tosses around terms like DRM, botnet, FTP, spear phishing and worm could be a quick, easy read for the head of the IT department. But for everyone else in the organisation it may or may not be one big mass of confusion – and with that bewilderment comes potential danger.

“There’s a serious gap in communication skills between cybersecurity pros and their general audiences, and it's essential for the people on the IT side to bridge it,'' Campos says.

“Increasingly complex security threats demand that cybersecurity professionals use plain language when they are communicating with those less familiar with tech talk.”

Campos says organisations can be vulnerable to hackers even if the staff have been warned about what to look for, simply because the employees don’t understand the language behind the warning.

After all, cyber threats aren't just a technology problem - they are a people problem, says Campos, who worked on cyber threats as a former employee of Microsoft.

''People are the weakest link in computer security and many companies don't promote a company philosophy of ‘computer security is everybody's business’,” Campos says.

In light of this, Campos has a few tips to improve communication between IT and everyone else in the organisation:

  • Incorporate this need into the hiring process. When hiring new staff for IT and cybersecurity teams, look for experts who have not only tech skills, but also the skills necessary to comfortably interact socially and clearly communicate in lay terms with all the stakeholders in the organisation.
  • Focus on training. Cybersecurity teams can be trained to become solution designers who can connect the dots, Campos says. They can then capture, clarify, and address all stakeholders' concerns, helping them to determine and keep their goals aligned.
  • Realize this is an ongoing process. It's important to ensure that the improved communication is sustained over the long haul, and people don't revert to old ways down the road, Campos says.

“Data breaches, data ransom plots, and email hacks intimidate us all. Cybersecurity teams themselves feel hard-pressed enough to prepare themselves for the onslaught of these gremlins, let alone to accomplish the challenging task of communicating to stakeholders about how to mitigate and deal with cybersecurity risks,” Campos says.

“But for organizations to keep their information and systems safe, that communication needs to be done, and in a way everyone can understand.”

Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.