The second part of the post on End User Behaviors from our MarketInsight report.
End-user Behaviors (continued)
The topic of training came up repeatedly whether we were talking about encryption and how its proper use relies on end-user training or that, at a high-level, it makes a lot more sense to educate people than to react to incidents once they have occurred. There was general agreement that expenditures on technology could actually be less with proper (re)training programs in place to provide constant education and build awareness.
There is a deep down expectation of privacy that most, if not all, employees have about their corporate email even though none exists. Most companies allow “reasonable personal use” but struggle with how to define it or where to draw the line, but many participants admitted that even they did the things they were telling people not to do – underscoring the difficulty in solving the problem and that this is not just about technology but people.
Providing immediate feedback to the user is one way to create awareness and to change behaviors. When providing feedback, the wording of the message can prove to be difficult to nail down requiring much iteration with corporate legal departments. In one case, a log-in banner was rewritten due to the welcoming tone of the message and was interpreted to be “too welcoming” and that it might construed as inviting unauthorized users on to the network.
Other forms of awareness building included “email awareness emails” (the irony of which is apparent) and one company cited how they provided people cell phone reminder cards showing employees how much a cell phone could cost above and beyond a land line. This simple awareness program reduced cell phone expenditures by some 25%!
Awareness and education were certainly viewed as the best possible avenues to address the people aspects of email usage however as one CISO pointed out the next generation of workers will enter the workplace with mobile phone, their own laptops, etc. and a certain sense of “entitlement” to intellectual property as they grew up with freeware/shareware and limited to no concern for copyrights or information protection.
No matter what, an effective information security program for email will rely on the employees and their awareness as key ingredient in changing culture and behaviors. As another participant summed up, “everybody speeds” but we “have to teach them” about the limitations and risks as smart people will continue to find workarounds if safeguards are perceived to be barriers placed in their way.