[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-the-human-firewall\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-the-human-firewall\/","headline":"The Ping: The Human Firewall","name":"The Ping: The Human Firewall","description":"ShareTweet Building an Effective Human Firewall Cyber attacks aren\u2019t just getting more frequent, they are also becoming significantly more vicious and sophisticated. One reason for this is because Cybercrime is easy to do\u2026anyone can find the tools on the dark web and easily start their own cybercrime business. Now, more than ever, is time to [&hellip;]","datePublished":"2018-05-25","dateModified":"2018-05-25","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"126","width":"300"},"url":"https:\/\/univista.com\/posts\/the-ping-the-human-firewall\/","about":["business management","malware","onboarding","safety","Security","The Ping","vulnerability"],"wordCount":619,"articleBody":"ShareTweet                                        Building an Effective Human FirewallCyber attacks aren\u2019t just getting more frequent, they are also becoming significantly more vicious and sophisticated. One reason for this is because Cybercrime is easy to do\u2026anyone can find the tools on the dark web and easily start their own cybercrime business. Now, more than ever, is time to take stock of your countermeasures with a focus on your staff as the likeliest entry point for cybercrime attacks.Cyber criminals count on the fact that busy people perform hundreds, if not thousands, of daily actions on a computer or device connected to the internet and they know that most of those actions are performed automatically and without much thought. As a result, the majority of today\u2019s data breaches result from human error, making cybersecurity a \u201cpeople problem\u201d as well as a technology issue.The solution to this people problem goes beyond IT and involves cultivating an entirely new employee mindset around cybersecurity. Our recommendation is to create an expectation of 100% participation\u2026it only takes one person to click on one link to bring the system down.When fully engaged, these three steps creates a formidable human firewall capable of spotting and preventing even the most sophisticated cybercrime attempts and offers a significant step towards mitigating the human error that is behind 95% of the cyber breaches occurring today.Three essential components to building a Human Firewall1. Communicate the Importance of CybersecurityA key element of building an effective human firewall is to communicate the significance of cybersecurity to your employees. If employees don\u2019t understand how important a subject matter is, they won\u2019t take the time to absorb the information you\u2019re providing, no matter how comprehensive or accurate. Personal and direct language like \u201cwe\u2019re counting on you\u201d and \u201cit\u2019s up to all of us,\u201d along with comments by managers and company leaders can help convince employees that cybersecurity is essential to the company and deserves their attention.2. Build Awareness and KnowledgeOnce people care and feel like they are part of the solution it\u2019s possible to start building a level of awareness and knowledge that will ultimately drive real change in individual and group behaviors over time. This is where a quality cybersecurity training program is vital to protecting your assets and your staff from the loss of data, productivity and money of a ransomware or phishing attack.3. Measure and MonitorTo assess the effectiveness of a company\u2019s current approach, it\u2019s important to measure employee awareness, attitudes, knowledge, and motivation regarding the cybersecurity materials, policies, and trainings they have provided.When used properly, the three key elements described above can cultivate a culture of cyber awareness where employees recognize and avoid risky situations. Cybersecurity awareness solutions, when coupled with sound teaching techniques and motivated employees, doesn\u2019t just arm people with knowledge \u2013 they equip and empower employees to put that knowledge to use in ways that make sense and that fit in with how they perform their jobs.Best Practices recommendation: Used properly, the three key elements described above can cultivate a culture of cyber awareness where employees recognize and avoid risky situations. Cybersecurity awareness solutions, when coupled with sound teaching techniques and motivated employees, don\u2019t just arm people with knowledge \u2013 they equip and empower employees to put that knowledge to use in ways that make sense and that fit in with how they perform their jobs.UniVista has developed the UniVista CyberSecurity Suite to help small businesses like yours accomplish all of the key elements. If you\u2019d like to know more about The UniVista CyberSecurity Suite, email us at ThePing@univista.com!Your UniVista Team*Celebrating 20 Years of Customer Satisfaction*ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: The Human Firewall","item":"https:\/\/univista.com\/posts\/the-ping-the-human-firewall\/#breadcrumbitem"}]}]