Expanding Safety-Sensitive Roles to Address Cyberattacks

The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners. In fact, according to recent data from Verizon’s Data Breach Investigations Report, ransomware accounted for 25% of all breaches in 2021—continuing its upward trend.

Risks of cyberattacks aren’t just limited to enterprise-sized companies; small and midsize business leaders are also prime targets for cyber attackers. To reduce threats that will interrupt business continuity, organizations can take several preventive measures to mitigate internal threats that leave them vulnerable. To reduce cybersecurity risks, here are a few best practices for organizations:

Ensure recent software updates occur. Developers constantly update their software to bring users the latest features and remedy security flaws hackers can exploit. Setting up employees’ operating systems or applications to update automatically can lessen an organization’s exposure.

Back up sensitive data. Having backup copies of the company’s or customers’ information is imperative and can guard against unforeseen catastrophes, not just cyberattacks. At least one of these copies should be stored offline and disconnected from your network, and inaccessible from the internet. Periodically test the backup to ensure its data can be recovered flawlessly.

Develop comprehensive cyber education and risk policies. The users of your information technology, including employees, are often the weakest point of your security – unless they are educated and made aware of the threats. For example, the strategy should include users choosing strong passwords and prohibiting the reuse of passwords across multiple accounts. The reuse of passwords is common and results in attacks referred to as credential stuffing attacks. A compromised password from one account is used on various other systems hoping that the user did not use unique passwords.

Companies should also reexamine their definition of safety as an added cybersecurity risk measure to include any risk that can hinder organizations' ability to operate and ultimately disrupt business continuity.

Redefining Your Company's Definition of Safety-Sensitive Skills
Traditionally, there is the temptation to limit drug testing to candidates and employees in positions associated with high physical risk or post-incident – but what about other risk-sensitive situations?

A reported 82% of breaches organizations experienced resulted from the human element, including phishing, misuse, human error, or stolen credentials. And although many employees are vigilant about deleting suspicious emails, working under the influence can reduce alertness, creating unnecessary vulnerabilities for organizations.

In addition to training employees to identify potential hazards and strengthening policies, organizations can further reduce risks by deterring substance use during work hours. One way to think about this is that no company expects an employee, remote or on-site, to put alcohol in their drink while on the clock and work under the influence all day. So why should the use of other substances be any different?

As cyber attackers continue to develop new malicious techniques and strategies, it is mission-critical to ensure employees are alert and using their best judgment. Beyond ensuring workers performing manual tasks aren’t creating hazardous situations, organizations need to have an effective substance policy to deter and reduce the chances of cyberattacks successfully penetrating the first line of defense – a company’s employees.

About the Author

Don Boian is the Chief Information Security Officer at Hound Labs, Inc., creator of ultra-sensitive, portable cannabis breathalyzer technology. He worked at the National Security Agency for 30 years on defensive and offensive cyber operations and most recently served as CISO for a large regional bank.

Featured

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

  • Gun Violence Report Finds Retail Spaces, K-12 Schools Most Targeted

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, today announced the release of its annual Gun Violence Report, offering a deep dive into the landscape of gun-related incidents across the United States. This analysis extends beyond mass fatality events, providing a more nuanced understanding of when, where, and why shootings occur. Read Now

  • Agentic AI Will Revolutionize Cybercrime in 2025 According to New Report

    Malwarebytes, a provider in real-time cyber protection, recently released its 2025 State of Malware report, which reveals insight into the emergence of agentic artificial intelligence (AI), plus the year’s most prominent threats and cybercrime tactics. The report details a significant uptick in the number of known ransomware attacks, the total value of ransoms paid in 2024, and how IT teams can address them. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.