Intelligent CIO Africa Issue 66 | Page 40

CIO OPINION
Trained employees are empowered , and empowered employees empower the company , protecting it against any and all potential breaches .
sending continuous updates on accurately implementing Zero Trust and providing security training programmes .
It is not enough to say that x is good , and y is bad . People from different backgrounds are likely to have different interpretations of security mistakes and mishaps . While bad actors exist , most insider threats turn out to be accidental and unintentional .
By providing resources , including regularly hosting briefings , insider threat programmes and cybersecurity awareness training at all levels – from the C-suite down to the intern cohorts – companies are more likely to see Zero Trust implementation unfold organically .
With the right information followed by an ‘ open door policy ’, employees will know they have safety nets to fall back on in case of error and will be well-versed in the host of security risks to watch out for and avoid .
There are always going to be threats that penetrate a company ’ s layers of security . But if employees are trained in sustaining the company ’ s security culture , then identifying and reporting these threats ( be it a call , email or text ) will become second nature .
Trained employees are empowered , and empowered employees empower the company , protecting it against any and all potential breaches .
Create tools and incentives for success
A culture of transparency and knowledge combined with trainings for preparation can help hone the skills that employees need for a successful Zero Trust environment . But when a culture of transparency may not be enough to keep employees motivated , introducing incentives for success can help .
Zero Trust technologies deployed in an organisation don ’ t just have to keep a weather eye on the horizon . Try making their deployment fun . Many of these technologies rely on tech-adaptive authentication to allow employers to create a risk score based on how their employees use their devices . Have fun with these scores ! Whether using them to help build healthy competition among employees or starting a rewards program based off top security scores , employers should look to incentivise participation .
By understanding user behaviour , employers can also provide custom support tools and resources employees may need – be it VPN , encryption , more training , etc . Use of these varied tools will help organisations cover all attack surfaces and create stronger security hygiene for all .
At the same time , incentives for getting or maintaining high security scores will motivate employees to continue using these resources and updating their security as needed .
While Zero Trust technologies are available to cover all attack surfaces and protect organisations , they mean nothing without the people using them , so aligning company success and security with employee success and security is critical .
This means prioritising a culture of transparency , open communication , trust in the process and faith in each other ’ s ability to do good . This , complemented by continuous trainings to ensure everyone stays on the wheel and nobody gets left behind , and various technologies to cover all attack surfaces and ensure optimal protection , can help create a network of armed and trained employees to defend against threats now and in the future . p
40 INTELLIGENTCIO AFRICA www . intelligentcio . com