Expanding Safety-Sensitive Roles to Address Cyberattacks

The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners. In fact, according to recent data from Verizon’s Data Breach Investigations Report, ransomware accounted for 25% of all breaches in 2021—continuing its upward trend.

Risks of cyberattacks aren’t just limited to enterprise-sized companies; small and midsize business leaders are also prime targets for cyber attackers. To reduce threats that will interrupt business continuity, organizations can take several preventive measures to mitigate internal threats that leave them vulnerable. To reduce cybersecurity risks, here are a few best practices for organizations:

Ensure recent software updates occur. Developers constantly update their software to bring users the latest features and remedy security flaws hackers can exploit. Setting up employees’ operating systems or applications to update automatically can lessen an organization’s exposure.

Back up sensitive data. Having backup copies of the company’s or customers’ information is imperative and can guard against unforeseen catastrophes, not just cyberattacks. At least one of these copies should be stored offline and disconnected from your network, and inaccessible from the internet. Periodically test the backup to ensure its data can be recovered flawlessly.

Develop comprehensive cyber education and risk policies. The users of your information technology, including employees, are often the weakest point of your security – unless they are educated and made aware of the threats. For example, the strategy should include users choosing strong passwords and prohibiting the reuse of passwords across multiple accounts. The reuse of passwords is common and results in attacks referred to as credential stuffing attacks. A compromised password from one account is used on various other systems hoping that the user did not use unique passwords.

Companies should also reexamine their definition of safety as an added cybersecurity risk measure to include any risk that can hinder organizations' ability to operate and ultimately disrupt business continuity.

Redefining Your Company's Definition of Safety-Sensitive Skills
Traditionally, there is the temptation to limit drug testing to candidates and employees in positions associated with high physical risk or post-incident – but what about other risk-sensitive situations?

A reported 82% of breaches organizations experienced resulted from the human element, including phishing, misuse, human error, or stolen credentials. And although many employees are vigilant about deleting suspicious emails, working under the influence can reduce alertness, creating unnecessary vulnerabilities for organizations.

In addition to training employees to identify potential hazards and strengthening policies, organizations can further reduce risks by deterring substance use during work hours. One way to think about this is that no company expects an employee, remote or on-site, to put alcohol in their drink while on the clock and work under the influence all day. So why should the use of other substances be any different?

As cyber attackers continue to develop new malicious techniques and strategies, it is mission-critical to ensure employees are alert and using their best judgment. Beyond ensuring workers performing manual tasks aren’t creating hazardous situations, organizations need to have an effective substance policy to deter and reduce the chances of cyberattacks successfully penetrating the first line of defense – a company’s employees.

About the Author

Don Boian is the Chief Information Security Officer at Hound Labs, Inc., creator of ultra-sensitive, portable cannabis breathalyzer technology. He worked at the National Security Agency for 30 years on defensive and offensive cyber operations and most recently served as CISO for a large regional bank.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

  • Security Questions Persist After Attempted Assassination Attempt of Donald Trump

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3