Expanding Safety-Sensitive Roles to Address Cyberattacks

The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners. In fact, according to recent data from Verizon’s Data Breach Investigations Report, ransomware accounted for 25% of all breaches in 2021—continuing its upward trend.

Risks of cyberattacks aren’t just limited to enterprise-sized companies; small and midsize business leaders are also prime targets for cyber attackers. To reduce threats that will interrupt business continuity, organizations can take several preventive measures to mitigate internal threats that leave them vulnerable. To reduce cybersecurity risks, here are a few best practices for organizations:

Ensure recent software updates occur. Developers constantly update their software to bring users the latest features and remedy security flaws hackers can exploit. Setting up employees’ operating systems or applications to update automatically can lessen an organization’s exposure.

Back up sensitive data. Having backup copies of the company’s or customers’ information is imperative and can guard against unforeseen catastrophes, not just cyberattacks. At least one of these copies should be stored offline and disconnected from your network, and inaccessible from the internet. Periodically test the backup to ensure its data can be recovered flawlessly.

Develop comprehensive cyber education and risk policies. The users of your information technology, including employees, are often the weakest point of your security – unless they are educated and made aware of the threats. For example, the strategy should include users choosing strong passwords and prohibiting the reuse of passwords across multiple accounts. The reuse of passwords is common and results in attacks referred to as credential stuffing attacks. A compromised password from one account is used on various other systems hoping that the user did not use unique passwords.

Companies should also reexamine their definition of safety as an added cybersecurity risk measure to include any risk that can hinder organizations' ability to operate and ultimately disrupt business continuity.

Redefining Your Company's Definition of Safety-Sensitive Skills
Traditionally, there is the temptation to limit drug testing to candidates and employees in positions associated with high physical risk or post-incident – but what about other risk-sensitive situations?

A reported 82% of breaches organizations experienced resulted from the human element, including phishing, misuse, human error, or stolen credentials. And although many employees are vigilant about deleting suspicious emails, working under the influence can reduce alertness, creating unnecessary vulnerabilities for organizations.

In addition to training employees to identify potential hazards and strengthening policies, organizations can further reduce risks by deterring substance use during work hours. One way to think about this is that no company expects an employee, remote or on-site, to put alcohol in their drink while on the clock and work under the influence all day. So why should the use of other substances be any different?

As cyber attackers continue to develop new malicious techniques and strategies, it is mission-critical to ensure employees are alert and using their best judgment. Beyond ensuring workers performing manual tasks aren’t creating hazardous situations, organizations need to have an effective substance policy to deter and reduce the chances of cyberattacks successfully penetrating the first line of defense – a company’s employees.

  • Ahead of Current Events Ahead of Current Events

    In this episode, Ralph C. Jensen chats with Dana Barnes, president of global government at Dataminr. We talk about the evolution of Dataminr and how data software benefits business and personnel alike. Dataminr delivers the earliest warnings on high impact events and critical information far in advance of other sources, enabling faster response, more effective risk mitigation for both public and private sector organizations. Barnes recites Dataminr history and how their platform works. With so much emphasis on cybersecurity, Barnes goes into detail about his cybersecurity background and the measures Dataminr takes to ensure safe and secure implementation.

Digital Edition

  • Security Today Magazine - November December 2022

    November / December 2022

    Featuring:

    • Key Tech Trend
    • Is Your Access Control System Cyber Secure?
    • Constantly Evolving
    • The Talent Shortage
    • Looking Forward to 2023

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Spaces4Learning
  • Campus Security & Life Safety