Organizations fail to protect their assets because they rely mainly, if not primarily, on technical solutions that are not sufficient.
Yet many security incidents are due to the exploitation of human vulnerabilities, which are responsible for more than 80% of security incidents.
There are, for example, individual differences which influence the adoption and involvement of employees in security awareness policies. This is often overlooked in favor of technology-related interventions.
Research was conducted by Hadlington in 2018, with others to follow. Among these many theories, there is one based on the locus of control.
Most of us lie on a spectrum between internal and external orientations. This locus of control can change over time.
A study conducted by Dr. Popovac showed that the locus of control acted as a "significant predictor of total scores on a measure of information security awareness"; in plain English:
The results are not surprising in themselves, but they are the first to be applied to the world of cybersecurity.
In the field, we see that users are limited in their attention to security warnings and guidelines. How can we change this paradigm?
The interest of this study is twofold:
- the first is to focus on those employees who could be at the root of an information security breach within their company, and to understand the factors behind unsafe behavior.
- the second is to suggest ways of designing more effective and, above all, appropriate training courses.
Thus, it is important to:
On the cyber side: If company employees believe that tools or the company are responsible for protecting them from cybercrime, then they will be less likely to take steps to protect themselves. The key is to make protection tools available, and to get employees involved. Protection against cybercrime starts at the personal level.
As we have seen, this trend (internal/external) is not immutable. To foster an internal locus of control, we need to :
On the cyber side: here's an example, to foster the internal locus of control: if we say that SolarWinds cost up to $100 billion, it won't have much impact on the employee, but if we remind them that cybercriminals can use social engineering methods on their children, retrieving personal data from social networks and others; they'll probably be more attuned, and make sure they take action to protect their families.
On the cyber side: "get in the game", promoting game mechanisms helps to engage employees in problem-solving, motivate them and consequently achieve better productivity and performance in security policies.
79% of participants in a survey conducted by Pulse Learning said they would be "more productive and motivated if their learning environment was more like a game".
Price Waterhouse Cooper developed Game of Threats™ to test and reinforce cyber defense skills.
The Digital Guardian developed DG Data Defender, to help other companies involve every employee in data security.
The constructivist approach (Piaget) emphasizes the dynamic structure of human experience. We no longer think in terms of categories: similarity and difference, stimuli and responses, but rather in terms of connectivity between all elements. In this way, unity and diversity are integrated. We are active beings in our own development. Constructivism advocates learning via a socially interactive process, based on experience and discovery.
This approach is opposed to behaviorism (Watson), which in learning, advocates changing behavior by rewarding correct performance (emphasis on the relationship between response and stimulus).
On the cyber side: