19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

78<br />

Part II: Putting Ethical Hacking in Motion<br />

✓ Removing user IDs for employees, contractors, and consultants who no<br />

longer work for the organization<br />

✓ Setting and resetting passwords<br />

✓ Responding to security incidents, such as suspicious behavior<br />

✓ Properly handling proprietary and confidential information<br />

✓ Escorting guests<br />

These policies must be enforceable and enforced for everyone within the<br />

organization. Keep them up-to-date and tell your end users about them.<br />

User awareness and training<br />

The best line of defense against social engineering is training employees to<br />

identify and respond to social engineering attacks. User awareness begins<br />

with initial training for everyone and follows with security awareness initiatives<br />

to keep social engineering defenses fresh in everyone’s mind. Align<br />

training and awareness with specific security policies — you may also want<br />

to have a dedicated security training and awareness policy.<br />

Consider outsourcing security training to a seasoned security trainer.<br />

Employees often take training more seriously if it comes from an outsider.<br />

Outsourcing security training is worth the investment.<br />

While you approach ongoing user training and awareness in your organization,<br />

the following tips can help you combat social engineering in the long term:<br />

✓ Treat security awareness and training as a business investment.<br />

✓ Train users on an ongoing basis to keep security fresh in their minds.<br />

✓ Include information privacy and security tasks and responsibilities in<br />

everyone’s job descriptions.<br />

✓ Tailor your content to your audience whenever possible.<br />

✓ Create a social engineering awareness program for your business functions<br />

and user roles.<br />

✓ Keep your messages as nontechnical as possible.<br />

✓ Develop incentive programs for preventing and reporting incidents.<br />

✓ Lead by example.<br />

Share these tips with your users to help prevent social engineering attacks:<br />

✓ Never divulge any information unless you can validate that the people<br />

requesting the information need it and are who they say they are. If a

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!