11.07.2015 Views

Information security awareness initiatives: Current practice and the ...

Information security awareness initiatives: Current practice and the ...

Information security awareness initiatives: Current practice and the ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong>measurement of successJuly 2007


PrefaceThe European Network <strong>and</strong> <strong>Information</strong> Security Agency(ENISA) is a European Union Agency created to advance<strong>the</strong> functioning of <strong>the</strong> Internal Market. The Agency’smission is to achieve a high <strong>and</strong> effective level of network<strong>and</strong> information <strong>security</strong> within <strong>the</strong> European Union.ENISA commissioned PricewaterhouseCoopers LLP(PwC) to develop this report to offer a perspective onwhat governments <strong>and</strong> private companies are currentlydoing for assessing <strong>the</strong> impact <strong>and</strong> success of <strong>awareness</strong>raising activities.This study is intended to be used by professionals withinorganisations <strong>and</strong> public bodies that are tasked withplanning, organising, <strong>and</strong> delivering information <strong>security</strong><strong>awareness</strong> <strong>initiatives</strong>.The study has focused on cultural change, <strong>the</strong> ways inwhich sets of metrics <strong>and</strong> key performance indicators(KPIs) can pay off, <strong>and</strong> how assessing methods(qualitative <strong>and</strong> quantitative) can contribute to <strong>the</strong>development of a wider culture of <strong>security</strong>.This involved ga<strong>the</strong>ring information on <strong>the</strong> current<strong>practice</strong>s of a number of European governmentdepartments <strong>and</strong> companies, to:• Provide an outline analysis of recommended<strong>security</strong> <strong>awareness</strong> <strong>practice</strong> <strong>and</strong> metrics to measure<strong>awareness</strong>;• Provide an outline of key metrics that can be used toeffectively assess <strong>awareness</strong>, as well as some highlevel;• Convey <strong>the</strong> results of <strong>the</strong> survey to assess what entitiesare doing with regards information <strong>security</strong> <strong>awareness</strong>;• Provide case studies of good <strong>practice</strong> for <strong>awareness</strong><strong>and</strong> measurement of effectiveness or to highlightinformation of benefit; <strong>and</strong>The research was carried out during May to July 2007using a structured questionnaire. This was made availableon a self-select basis to people responsible for information<strong>security</strong> in European government departments <strong>and</strong>companies. In total, 67 organisations headquartered innine different European countries responded. Many of<strong>the</strong>se had operations in several European countries. Thesize of <strong>the</strong> organisations varied from less than 50 staff tomore than 10,000 staff. There was a spread of responsesacross all industry sectors. PwC <strong>the</strong>n interviewed 12 of<strong>the</strong> 67 respondents in depth <strong>and</strong> wrote <strong>the</strong>se interviewsup as case studies.This report, <strong>the</strong>refore, gives an indication of whatEuropean organisations are currently doing to measure<strong>and</strong> improve information <strong>security</strong> <strong>awareness</strong>. Becauseof <strong>the</strong> self-select nature of this study <strong>and</strong> limited samplesize, <strong>the</strong> results should not be interpreted as statisticallyrepresentative of European businesses <strong>and</strong> governmentdepartments as a whole.About ENISAENISA is a European Union Agency created to advance<strong>the</strong> functioning of <strong>the</strong> Internal Market by advising <strong>and</strong>assisting Member States, EU bodies <strong>and</strong> <strong>the</strong> businesscommunity on how to ensure a high <strong>and</strong> effective level ofnetwork <strong>and</strong> information <strong>security</strong>. ENISA also serves as acentre of expertise for Member States <strong>and</strong> EU institutionsthat facilitates information exchange <strong>and</strong> cooperation.Contact detailsIsabella Santae-mail: <strong>awareness</strong>@enisa.europa.euInternet http://www.enisa.europa.eu• Contribute to <strong>the</strong> development of an information<strong>security</strong> culture in Member States by encouragingorganisations to act responsibly <strong>and</strong> thus operate moresecurely.Research carried out for ENISA by:The member firms of <strong>the</strong> PricewaterhouseCoopers network (www.pwc.com/uk) provide industry-focused assurance, tax<strong>and</strong> advisory services to build public trust <strong>and</strong> enhance value for its clients <strong>and</strong> <strong>the</strong>ir stakeholders. More than 140,000people in 149 countries share <strong>the</strong>ir thinking, experience <strong>and</strong> solutions to develop fresh perspectives <strong>and</strong> practical advice.Unless o<strong>the</strong>rwise indicated, ‘PricewaterhouseCoopers’ refers to PricewaterhouseCoopers LLP a limited liability partnershipincorporated in Engl<strong>and</strong>. PricewaterhouseCoopers LLP is a member firm of PricewaterhouseCoopers International Limited.


ExecutivesummaryThis report analyses how organisations <strong>and</strong> governmentswithin <strong>the</strong> European Union (EU) are approachinginformation <strong>security</strong> <strong>awareness</strong> <strong>and</strong> <strong>the</strong> measurement ofeffectiveness. The report covers three main areas.The first part of <strong>the</strong> study looks at <strong>the</strong> importance ofinformation <strong>security</strong> <strong>awareness</strong> <strong>and</strong> specific topics torespondents (see pages 3 to 7). The main findings are:• <strong>Information</strong> <strong>security</strong> is seen as a high or very highpriority in four fifths of respondents;• Much of this is driven by a need to provide assuranceto customers that <strong>the</strong>ir sensitive data is protected.Identity <strong>the</strong>ft is a significant concern;• There is also widespread recognition that respondentsare now heavily dependent on technology, <strong>and</strong> <strong>the</strong>Internet in particular. This leaves companies moreexposed to information <strong>security</strong> threats than ever;• In addition, <strong>the</strong>re is increased regulatory focus on thisarea, both inside <strong>the</strong> EU <strong>and</strong> beyond;• The consensus is that <strong>the</strong> most important topics forstaff <strong>awareness</strong> are email, physical access, passwords<strong>and</strong> <strong>the</strong> Internet; <strong>and</strong>• Instant messaging <strong>and</strong> clear desk policies are <strong>the</strong> leastfavoured topics.The second part considers techniques to raise information<strong>security</strong> <strong>awareness</strong> (see pages 8 to 13). The main findingsare:• Almost every respondent has defined <strong>the</strong>ir <strong>security</strong>policies, ei<strong>the</strong>r in <strong>the</strong>ir staff h<strong>and</strong>book or a separate<strong>security</strong> policy. 85% of respondents have set upan intranet site that provides guidance to staff oninformation <strong>security</strong> matters. These techniques areseen as low cost basic disciplines. However, alone <strong>the</strong>yare not effective ways to change staff behaviour;• Respondents find training to be <strong>the</strong> most effectivetechnique. 72% include <strong>security</strong> messages in inductiontraining for new staff. Ongoing training for existingstaff is much more patchy; <strong>the</strong> cost makes manyrespondents reluctant;• Half of respondents are using computer-based training(CBT), <strong>and</strong> two thirds of <strong>the</strong>se have m<strong>and</strong>ated it;benefits cited are cost-effectiveness, consistency ofdelivery <strong>and</strong> ability to measure results;• Despite <strong>the</strong> high priority given to <strong>security</strong>, manyrespondents find it difficult to justify significant spend on<strong>awareness</strong> programmes. Only a third of respondentsbuild a formal business case to justify this expenditure;of <strong>the</strong>se, only half attempt to quantify <strong>the</strong> benefits that<strong>the</strong>ir <strong>awareness</strong> programmes will achieve, <strong>and</strong> very fewevaluate return on investment (ROI); <strong>and</strong>• Most respondents instead think of <strong>security</strong> <strong>awareness</strong>training as something <strong>the</strong>y just have to do, i.e. acompliance requirement. As such, <strong>the</strong>ir budget istreated as an overhead ra<strong>the</strong>r than an investment.<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong> measurement of success


Executive summaryThe final part reviews <strong>the</strong> mechanisms <strong>and</strong> techniquesthat are used to measure information <strong>security</strong> <strong>awareness</strong><strong>initiatives</strong> (see pages 14 to 20). The main findings are:• A wide variety of different methods are used to measure<strong>the</strong> effectiveness of information <strong>security</strong> <strong>awareness</strong><strong>initiatives</strong>. Organisations appear to find it very difficult toput effective quantitative metrics in place;• There is little consensus on <strong>the</strong> most effectivemeasures. This is clearly an area where good <strong>practice</strong>is evolving;• Ideally, respondents would like to be able to measureactual changes in staff behaviours resulting from <strong>the</strong><strong>awareness</strong> activities. As a consequence, relatively fewrespondents find input metrics (e.g. number of visitorsto intranet site, number of leaflets distributed) helpful;• The most popular source of information on actualbehaviours is audit (internal or external); two thirds ofrespondents use policy breaches highlighted in auditreports as a measure. The auditors’ objective <strong>and</strong>systematic approach was felt to make <strong>the</strong>se reportsreliable sources of information;• Many respondents use <strong>the</strong>ir experience of <strong>security</strong>incidents as a metric. The most common metrics are<strong>the</strong> number of incidents caused by human behaviour<strong>and</strong> root cause analysis of <strong>the</strong> most serious incidents;more than half of respondents use each of <strong>the</strong>se. Manyo<strong>the</strong>r respondents, however, have ab<strong>and</strong>oned <strong>security</strong>incident statistics as a measure of <strong>security</strong> <strong>awareness</strong>,since <strong>the</strong>re are many o<strong>the</strong>r factors involved;• A third of respondents include questions on <strong>security</strong><strong>awareness</strong> in staff surveys. They <strong>the</strong>n measure<strong>awareness</strong> levels before <strong>and</strong> after <strong>initiatives</strong> take place.However, some respondents highlight issues with <strong>the</strong>complexity of collecting <strong>and</strong> processing this data; <strong>and</strong>• Some metrics are used because <strong>the</strong>y provide insightinto actual behaviours (e.g. scans or tests). O<strong>the</strong>rsare adopted because <strong>the</strong>y resonate with <strong>the</strong> seniormanagement that sponsor <strong>awareness</strong> programmes(e.g. cost of incidents).Each organisation needs to find <strong>the</strong> right balance for<strong>the</strong>m; <strong>the</strong>re is no “one size fits all” solution. Keeping <strong>the</strong>approach simple tends to keep it cost-effective. Manycurrently struggle with quantifying <strong>security</strong> <strong>awareness</strong>;however, provided simple mistakes are avoided, abalanced set of key performance indicators (KPIs) <strong>and</strong>metrics can provide real insight into <strong>the</strong> effectivenessof <strong>awareness</strong> programmes. Only with this insight areorganisations able to change <strong>the</strong>ir programmes froma compliance activity to one that really benefits <strong>the</strong>iroperations.Overall, an iterative approach to <strong>security</strong> <strong>awareness</strong>programmes appears most effective, as illustrated below:Inputs:<strong>Information</strong> <strong>security</strong> policy; strategy; business case; riskassessment, budget; aims <strong>and</strong> objectives; legislation/compliancerequirementsSuccess factors:Executive sponsorship; whole business involvement; user buy-in;access to resources <strong>and</strong> time; cultural sensitivityTechniques:Face-face training; induction training; policy; intranet sites; CBTs;tests <strong>and</strong> quizzesSuccess factors:Relevance of material; ease of access <strong>and</strong> use; m<strong>and</strong>atoryover voluntary; targeted risk focused training; key managementinvolvementTypes:Security incidents/root cause; Results of audits; Survey of business;Test users' behaviours, Number of staff completing trainingSuccess factors:Know what you can measure; relevance of measurement; regulartimely assessmentENISA – <strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:


Importanceof information<strong>security</strong><strong>awareness</strong>Organisations, whe<strong>the</strong>r private or public, are increasinglystoring <strong>and</strong> making more information availableelectronically. There is a broad increase in reliance on ITsystems.This is coupled with an extraordinary increase in <strong>the</strong> useof Internet services. This is becoming an increasinglyimportant part of doing business. Lack of an Internetpresence can be detrimental to organisations’ businessobjectives.The increasing use of IT systems to store <strong>and</strong> processinformation makes keeping this information secure moreimportant. One of <strong>the</strong> key undertakings an organisationhas is to ensure that staff act in an appropriate manner.This includes staff acting to keep sensitive informationsecure.The <strong>Information</strong> Security Forum (ISF) is one of <strong>the</strong> world’sleading independent authorities on information <strong>security</strong>.Through surveys <strong>and</strong> research, <strong>the</strong> ISF have definedinformation <strong>security</strong> <strong>awareness</strong> as:‘an ongoing process of learning that ismeaningful to recipients, <strong>and</strong> delivers measurablebenefits to <strong>the</strong> organisation from lastingbehavioural change.’This information <strong>security</strong> <strong>awareness</strong> is a major componentwithin industry good <strong>practice</strong> for <strong>security</strong>. Severalinternational st<strong>and</strong>ards refer to this as a prerequisite:• ISO 27001;• COBIT;• Payment Card Industries – Data Security St<strong>and</strong>ard; <strong>and</strong>• ISO 9001:2000.Some of <strong>the</strong> key drivers increasing <strong>the</strong> emphasis oninformation <strong>security</strong> <strong>awareness</strong> are:• Business requirements are changing, as use oftechnology (such as podcasts) evolves;• Foreign regulators (e.g. <strong>the</strong> US <strong>and</strong> Singapore) areexpecting staff to receive <strong>awareness</strong> training;• The focus on <strong>security</strong> from regulatory bodies within EUMember States is increasing. A recent example is <strong>the</strong>UK information commissioner’s comments to UK ChiefExecutive Officers on “unacceptable privacy breaches”;• The threat from organised crime is on <strong>the</strong> rise. A recentreport on Internet <strong>security</strong> highlighted high levels ofmalicious activity across <strong>the</strong> Internet, with increases inphishing, spam, ‘bot’ networks, Trojans, <strong>and</strong> zero-daythreats. In <strong>the</strong> past, <strong>the</strong>se threats were usually distinct<strong>and</strong> could be addressed separately. Attackers arenow refining <strong>the</strong>ir methods, so attacks tend to involvemultiple attack vectors. They are also consolidating<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong> measurement of success


Importance of information <strong>security</strong> <strong>awareness</strong><strong>the</strong>ir assets to create global networks that support coordinatedcriminal activity;• Customers are more sensitive to <strong>security</strong> issues thanin <strong>the</strong> past. Adverse press coverage can cause majorimpact to an organisation’s reputation; <strong>and</strong>• Identity <strong>the</strong>ft is an increasingly prevalent <strong>security</strong>issue. Organisations that store <strong>and</strong> manage personalidentification information must take care to ensure<strong>the</strong> confidentiality <strong>and</strong> integrity of such data. Anycompromise that results in <strong>the</strong> leakage of personalidentity data could cause loss of public confidence,legal liability, <strong>and</strong>/or costly litigation.Given <strong>the</strong>se drivers, it is not a surprise that four fifths ofrespondents rate information <strong>security</strong> as a high or veryhigh priority to <strong>the</strong>ir senior management. This is similar to<strong>the</strong> proportion noted in o<strong>the</strong>r recent <strong>security</strong> surveys.Importance of information <strong>security</strong>Nei<strong>the</strong>r highnor lowpriority16%Low priority4%50%High priority30%Very high priority<strong>Information</strong> <strong>security</strong> is wide ranging <strong>and</strong> has manyvaried topics. Their importance to different organisationsdepends on <strong>the</strong> nature of <strong>the</strong> risks <strong>the</strong>y face. Forexample, financial services <strong>and</strong> technology respondentsshare concerns over passwords; however, phishing ismore of a concern in financial services <strong>and</strong> patching moreimportant to technology companies.The priority given to information <strong>security</strong> appears to relatemore to <strong>the</strong> attitude of senior management than <strong>the</strong> sectorin which <strong>the</strong> organisation operates (hence <strong>the</strong> risks towhich it is exposed). For example, most governmentdepartments responding say <strong>security</strong> is a very highpriority to <strong>the</strong>ir senior management; one, however, ratedit as a low priority <strong>and</strong> seems to be carrying out <strong>the</strong> bareminimum necessary to comply with m<strong>and</strong>atory guidance.Investment bank – to changebehaviours, training needs to beinteractiveAn investment bank explained that its primaryobjective is to achieve regulatory compliance in acost-effective way.This is not possible without <strong>the</strong> creation of clearpolicies that set out what individuals should<strong>and</strong> should not do. Without this foundation,enforcement <strong>and</strong> discipline become hard if thingsbreak down. The bank has, as far as possible,included information <strong>security</strong> points in existingpolicies <strong>and</strong> training, ra<strong>the</strong>r than creating newones.Policies <strong>the</strong>mselves are not effective unless staffunderst<strong>and</strong> <strong>the</strong>m. The bank’s <strong>security</strong> team givesinduction presentations to all new joiners thatexplain <strong>the</strong> bank’s <strong>security</strong> policies. This face-tofacecontact gives staff an opportunity to discusspossible issues with <strong>the</strong> <strong>security</strong> team. Feedbackfrom <strong>the</strong> training shows that interaction is criticalto challenging people’s attitudes <strong>and</strong> helping <strong>the</strong>mlearn. If people are asking questions, <strong>the</strong>y arethinking <strong>and</strong> considering <strong>the</strong> information. A roomfull of silent people is unlikely to be learning much.Sharing war stories <strong>and</strong> relevant experiences helpsstaff see how <strong>security</strong> threats might affect <strong>the</strong>m.The bank has found that induction training aloneis not enough. It is important that staff receivefrequent reminders that reinforce key messagesin a coherent way. Critical to this reinforcementhas been getting senior management to lead byexample; <strong>the</strong>y, ra<strong>the</strong>r than <strong>the</strong> <strong>security</strong> team, are<strong>the</strong> best people to promote <strong>the</strong> importance of <strong>the</strong>messages.The <strong>security</strong> team uses a variety of techniquesto reinforce <strong>awareness</strong> messages on an ongoingbasis. Quizzes <strong>and</strong> prizes get a good responselevel from staff; <strong>the</strong>y get people thinking, <strong>and</strong>are well received within <strong>the</strong> business. Again,interaction with staff is vital. For example, postersthat are passive reminders <strong>and</strong> ultimately requireno individual action are often ignored in <strong>practice</strong>.Intranet articles <strong>and</strong> sites are good ways topromote messages to those that already activelyuse <strong>the</strong>m. However, for people who do not visit<strong>the</strong>m (<strong>the</strong> majority of staff), <strong>the</strong>y are not aneffective mechanism.4 ENISA – <strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:


How important or unimportant is it to your business to ensure that staff are awareof each of <strong>the</strong> following information <strong>security</strong> topics or risks?Very importantImportantNot very importantNot at all importantEmail <strong>and</strong> electronic communicationsPhysical <strong>security</strong>/access to buildingsPasswordsInternet <strong>security</strong>Responsibilities for information <strong>security</strong>VirusesSoftware licensing <strong>and</strong> copyrightSecurity incident reportingSecurity updates <strong>and</strong> patchesMobile phones <strong>and</strong> PDAsSecurity out of <strong>the</strong> officePersonal use of corporate equipmentPhishingClear desk policyInstant messaging-20 -10 0 10 20 30 40 50 60 70Number of respondentsTraditionally, financial services companies have beenleaders in <strong>security</strong> <strong>practice</strong>. Our respondents confirm that<strong>security</strong> remains a high priority to most financial servicesboards; however, in some <strong>security</strong> still seems to be drivenbottom-up ra<strong>the</strong>r than top-down.One company rating <strong>security</strong> as a low priority sums up<strong>the</strong> attitude of <strong>the</strong>ir senior management as taking <strong>the</strong> viewthat nothing bad has happened yet <strong>and</strong> so why spendmoney.In contrast, those at <strong>the</strong> o<strong>the</strong>r end of <strong>the</strong> spectrum areprincipally motivated by customer perception <strong>and</strong> <strong>the</strong>damage to <strong>the</strong>ir reputation that a breach might cause.Overall, most respondents agree that four topics are veryimportant for staff to underst<strong>and</strong>:• Email <strong>and</strong> electronic communications;• Physical <strong>security</strong>/access to buildings;• Passwords; <strong>and</strong>• Internet <strong>security</strong>.For each of <strong>the</strong>se, more than half of respondents rate<strong>the</strong>m as very important; roughly nine tenths rate <strong>the</strong>m asvery important or important.Passwords remain <strong>the</strong> primary au<strong>the</strong>ntication methodto IT systems. Given concerns about potential privacybreaches, <strong>the</strong> need for staff to adopt good passworddisciplines is high. There have been many recent pressstories involving inappropriate emails or Internet usage.The reputations of many companies <strong>and</strong> governmentdepartments have suffered as a result. Making sure thatstaff are aware of what <strong>the</strong> organisation considers to beacceptable usage is critical here.Avoiding easily guessable passwords, keeping passwordssecure <strong>and</strong> not sharing <strong>the</strong>m are all important elements of<strong>awareness</strong> training.In <strong>the</strong> light of <strong>the</strong> rise in terrorist activity over <strong>the</strong> lastdecade, it is perhaps unsurprising that physical <strong>security</strong>is so high up <strong>the</strong> list. Particular issues here include tailgating,escorting visitors <strong>and</strong> granting/rescinding accessto temporary staff.Interestingly, <strong>the</strong> respondents that rate email <strong>and</strong> physical<strong>security</strong> as not very important are from <strong>the</strong> public sector.Attitudes to <strong>the</strong>se specific areas may be more relaxedhere.For most of <strong>the</strong> o<strong>the</strong>r topics, roughly four fifths ofrespondents rate <strong>the</strong>m as ei<strong>the</strong>r very important orimportant.Some of <strong>the</strong>se topics (responsibilities for information<strong>security</strong> within <strong>the</strong> organisation <strong>and</strong> <strong>security</strong> incidentreporting) are seen as basic information that staff neededto know.Viruses <strong>and</strong> patching are a particular concern in <strong>the</strong>technology sector. The days of indiscriminate Internetworms are past. Businesses today are subject tosophisticated targeted attacks by programs that hide fromdetection <strong>and</strong> ga<strong>the</strong>r confidential information. Staff needto be aware of <strong>the</strong> changing nature of this threat.<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong> measurement of success 5


Importance of information <strong>security</strong> <strong>awareness</strong>Mobile Phones <strong>and</strong> PDAs (Personal Digital Assistants e.g.Blackberries) are a particular issue for financial servicesrespondents. Organisations in this sector can make <strong>and</strong>lose money in short timeframes. <strong>Information</strong> tends to bemore time critical to <strong>the</strong>m <strong>and</strong> <strong>the</strong>ir staff. They, <strong>the</strong>refore,tend to be leaders in adopting technologies that provideinformation to staff right now.There are two clear topics that are of perceived leastimportance to organisations. These are promotion of aclear desk policy <strong>and</strong> instant messaging.The low priority given to <strong>awareness</strong> of clear desk policiesis, perhaps, underst<strong>and</strong>able. Many companies simply donot adopt or enforce such policies. They feel <strong>the</strong>ir physicalaccess controls mitigate <strong>the</strong> risks sufficiently.The low priority given to <strong>the</strong> use of instant messaging ismore of a paradox given <strong>the</strong> high importance attributed toemail. Both provide a mechanism for people to connectdirectly with external parties <strong>and</strong> to transfer information to<strong>the</strong>m. They would appear to be very similar in nature <strong>and</strong>risk.There is a clear risk of uncontrolled distribution ofconfidential information through both media. Indeed,it could be argued that instant messaging poses ahigher risk than <strong>the</strong> use of email, since email filters areoften more sophisticated. It may simply be that somerespondents have blocked instant messaging technologyfrom working in <strong>the</strong>ir organisation, so do not feel <strong>the</strong>yhave to make staff aware of <strong>the</strong> risks.International insurer – senior management commitment makesa big differenceAn insurance company explained why information <strong>security</strong>is important to <strong>the</strong>ir business. They collect, store, <strong>and</strong>process significant amounts of financial, medical, <strong>and</strong>personal information. This information is <strong>the</strong>ir number oneasset; confidentiality breaches could put <strong>the</strong>ir reputationat risk, as well as exposing <strong>the</strong>m to harmful litigation.Unfortunately, <strong>the</strong> threats (such as identity <strong>the</strong>ft <strong>and</strong>scams) are rising; this makes staff <strong>awareness</strong> vital.The main challenge has been to develop an approachthat is suitable for over 10,000 employees speaking manydifferent languages. To counteract this, <strong>the</strong> companyengaged an external provider to help <strong>the</strong>m build suitabletraining plans <strong>and</strong> materials. To create <strong>the</strong> greatest impactwith staff, training materials were translated into <strong>the</strong> localmo<strong>the</strong>r tongues of <strong>the</strong> countries concerned.There is a continual programme to adjust <strong>and</strong> promote <strong>the</strong>key messages. The objectives of this are to try to changepeople’s behaviour <strong>and</strong> perception of risk. Numeroustechniques are used to reach <strong>the</strong> audience, since differentpeople learn by different mechanisms.The most effective technique has been face-to-facetime with staff through workshops <strong>and</strong> training sessions.Being able to put a face to a name or function is morepersonable <strong>and</strong> people are more receptive to messagesbeing face-to-face. The training is m<strong>and</strong>atory. Seniormanagement actively support <strong>the</strong> <strong>awareness</strong> schemes,making sure training events are at convenient times for<strong>the</strong> business <strong>and</strong> promoting <strong>the</strong>m to staff. There is goodattendance at sessions since missing <strong>the</strong> events resultsin escalation to <strong>the</strong> employee’s manager. This seniormanagement support across <strong>the</strong> business has proved tobe critical to <strong>the</strong> success of <strong>the</strong> <strong>awareness</strong> programme.O<strong>the</strong>r non-interactive mechanisms, such as intranetarticles, emails, posters <strong>and</strong> publications, are used toreinforce important messages. However, it has proveddifficult to gauge how many people have read orunderstood <strong>the</strong> messages <strong>and</strong> people can easily ignore<strong>the</strong>m. So, <strong>the</strong>y are used as a complement to, ra<strong>the</strong>r than asubstitute for, classroom training.The main measure of <strong>the</strong> impact of <strong>the</strong> <strong>awareness</strong> trainingis feedback <strong>and</strong> questionnaires completed on or shortlyafter training sessions. This feedback gives a good insightinto <strong>the</strong> impact of <strong>the</strong> training on <strong>the</strong> individual. Generallythis has been positive, with <strong>the</strong> vast majority saying that<strong>the</strong>y have learned something new <strong>and</strong> will try to change<strong>the</strong>ir behaviours.O<strong>the</strong>r ways to test <strong>awareness</strong>, such as checking <strong>the</strong>strength of passwords or mocking up social engineeringtype situations to gauge responses, have beenconsidered. However, <strong>the</strong>se are not used, due to concernsabout dependence on o<strong>the</strong>r variables (such as <strong>the</strong> moodof <strong>the</strong> person), privacy <strong>and</strong> entrapment.The company is now focused on ensuring that trainingcontinues to engage people; e-learning modules are beingdeveloped to add variety. A continual process is underwayto enhance <strong>the</strong> relevance of <strong>the</strong> material to staff, so <strong>the</strong>ycan see <strong>the</strong> benefits <strong>and</strong> underst<strong>and</strong> <strong>the</strong> risks moreclearly.ENISA – <strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:


International financial services group – changing times drivechanging needsA large international financial services group explainedwhy a new approach to information <strong>security</strong> <strong>awareness</strong>has been implemented. The firm’s objective is forcustomers <strong>and</strong> staff to view <strong>the</strong> firm as <strong>the</strong> safest placeto do business. The firm believes good <strong>security</strong> is goodbusiness.Given its size <strong>and</strong> <strong>the</strong> diversity of its operations, <strong>the</strong> firm<strong>and</strong> its customers are subject to continually changingthreats. Fraudsters have always targeted banks, but <strong>the</strong>increasing use of <strong>the</strong> Internet has changed <strong>the</strong> nature of<strong>the</strong>se fraud risks; keeping losses to customers <strong>and</strong> <strong>the</strong>firm under control is a strong driver for <strong>security</strong>.There also appears to be a shift in <strong>the</strong> regulatory <strong>and</strong>cultural environment. Countries outside <strong>the</strong> EU (such as<strong>the</strong> US <strong>and</strong> Singapore) already have more prescriptiverequirements for information <strong>security</strong> training. The climatewithin <strong>the</strong> EU appears to be changing. <strong>Information</strong><strong>security</strong> <strong>and</strong> privacy are becoming more important onpeople’s agendas. In this changing environment, <strong>the</strong> bankwants to make sure it is ahead of <strong>the</strong> curve.This has driven some changes to <strong>the</strong>ir global <strong>awareness</strong>strategy over <strong>the</strong> last year. Corporate information <strong>security</strong>policy has been altered <strong>and</strong> <strong>awareness</strong> <strong>and</strong> trainingare now m<strong>and</strong>atory. Job descriptions <strong>and</strong> individuals’objectives are being tailored to include information<strong>security</strong> responsibilities.A challenge is <strong>the</strong> size <strong>and</strong> scope of <strong>the</strong> different divisionsof <strong>the</strong> company. A centralised team is now in place toco-ordinate <strong>the</strong> <strong>awareness</strong> <strong>and</strong> training strategy <strong>and</strong> settraining st<strong>and</strong>ards for information <strong>security</strong> <strong>awareness</strong>across <strong>the</strong> firm. Individual business units are <strong>the</strong>nresponsible for implementing <strong>the</strong> policy <strong>and</strong> st<strong>and</strong>ards in<strong>the</strong>ir local operations.The firm has found that <strong>the</strong> most important thing is to havea structured approach, <strong>and</strong> not just do things in an ad-hocfashion. In this vein, <strong>the</strong> firm uses a variety of techniquesto keep <strong>the</strong> messages <strong>and</strong> media channels fresh,including a <strong>security</strong> web portal. Keeping <strong>the</strong> materialrelevant <strong>and</strong> up-to-date has helped <strong>the</strong> effectiveness of<strong>the</strong> message. <strong>Current</strong>ly, <strong>the</strong>re is not much face-to-facetraining, although <strong>the</strong>re are plans to include more ofthis later in <strong>the</strong> programme. This will be initially targetedat <strong>the</strong> key influencers <strong>and</strong> managers, so that it has <strong>the</strong>biggest impact on <strong>the</strong> culture. If management buy into<strong>the</strong> importance of <strong>security</strong> <strong>awareness</strong>, <strong>the</strong>y will drive <strong>and</strong>promote it within <strong>the</strong>ir business units.While some business units use computer-based training(CBT), <strong>the</strong>y are not as widespread as was initiallyplanned. There were plans for a centralised global CBTsystem. However, due to <strong>the</strong> diversity of <strong>the</strong> business <strong>and</strong><strong>the</strong> cost of updating material, this was not implemented.O<strong>the</strong>r techniques <strong>the</strong>y have found to be ineffective are“free stationery”; pens, pencils, etc.Despite <strong>the</strong> very structured <strong>and</strong> clearly defined approachadopted, quantitative assessment of <strong>the</strong> impact <strong>and</strong>effectiveness has proved problematic. An information<strong>security</strong> specific self assessment used to be carriedout regularly to gauge <strong>the</strong> level of <strong>awareness</strong> with staff.However, this was discontinued since it required a largeamount of resources to co-ordinate <strong>and</strong> analyse, <strong>and</strong>it was found that some of <strong>the</strong> results were misleading.People will answer surveys with <strong>the</strong> answers that <strong>the</strong>ythink you want to hear <strong>and</strong> not what is actually goingon. The survey suggested staff knew procedures well;however, <strong>the</strong> results of internal <strong>and</strong> external auditsshowed that this was not always correct.The firm is now focusing on measuring <strong>and</strong> reporting ontraining, as well as watching <strong>the</strong> results of internal <strong>and</strong>external audits closely. Now that information <strong>security</strong><strong>awareness</strong> <strong>and</strong> training requirements are set in policy, <strong>the</strong>central team can review audits <strong>and</strong> compliance measuresto monitor <strong>the</strong> levels of <strong>awareness</strong> <strong>and</strong> <strong>the</strong> effectivenessof training.<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong> measurement of success


Approachesto raise<strong>awareness</strong>The foundation for any framework for information <strong>security</strong><strong>awareness</strong> is a formal <strong>security</strong> policy. Without an outline‘law’ covering <strong>the</strong> use of systems <strong>and</strong> information,enforcing good behaviour is very hard.Good <strong>practice</strong> st<strong>and</strong>ards place a strong emphasis onhaving an organisation-wide <strong>security</strong> policy. For example,ISO 27001 suggests that organisations implement training<strong>and</strong> <strong>awareness</strong> programmes. There is a requirement ofmanagement to ensure that people working for <strong>the</strong>m apply<strong>security</strong> according to polices. To accomplish this <strong>the</strong>y arerequired to provide appropriate <strong>awareness</strong> training <strong>and</strong>regular updates in organisational policies <strong>and</strong> procedures,as relevant for <strong>the</strong> job function of all employees of <strong>the</strong>organisation <strong>and</strong>, where relevant, contractors <strong>and</strong> thirdparty users.Incidentally, many st<strong>and</strong>ards also suggest or require thata company’s <strong>security</strong> policy should also include user<strong>awareness</strong> training.Recent surveys suggest that <strong>the</strong> number of companieswith a formal <strong>security</strong> policy in place has never beenhigher. Among our respondents, 88% have a specific<strong>security</strong> policy, <strong>and</strong> a fur<strong>the</strong>r 76% refer to <strong>security</strong>requirements in <strong>the</strong>ir staff h<strong>and</strong>book.A key component of any information <strong>security</strong> policy <strong>and</strong><strong>awareness</strong> training is to analyse <strong>the</strong> threats <strong>and</strong> risks that<strong>the</strong> business faces. This analysis should drive <strong>the</strong> areasthat <strong>the</strong> policy <strong>and</strong> training need to cover.Every organisation faces changing environments, threats<strong>and</strong> risks. To be effective, any <strong>awareness</strong> <strong>initiatives</strong>should be supported by senior management. Ideally, itshould have board or executive level endorsement, toenhance <strong>the</strong> importance of <strong>the</strong> topic with staff. If seniormanagement do not treat <strong>awareness</strong> as important, it isunlikely that training will be successful.Most st<strong>and</strong>ards recommend that a formalised approachis adopted to information <strong>security</strong> <strong>awareness</strong>. A virtuouscircle involves three reinforcing elements:1. Requirements analysis: Management need to identifywhat topics staff need to underst<strong>and</strong>. Users should bemade aware of <strong>the</strong> sections of <strong>the</strong> <strong>security</strong> policy thatare relevant (to <strong>the</strong>ir job function). Many st<strong>and</strong>ardssuggest topics to consider, such as spyware, virusoutbreaks <strong>and</strong> strong passwords.2. Training tailored to role: Both contractors <strong>and</strong>employees should receive training, appropriatelygeared towards <strong>the</strong>ir role. They should also be regularlyupdated with any relevant changes to <strong>the</strong> <strong>security</strong>policies or procedures. Training needs to addresshow staff can implement <strong>security</strong> in <strong>the</strong>ir day-to-dayprocedures.ENISA – <strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:


There appear to be certain basic disciplines that everyorganisation should adopt. Almost every respondenthas defined <strong>the</strong>ir <strong>security</strong> policies, ei<strong>the</strong>r in <strong>the</strong>irstaff h<strong>and</strong>book or a separate <strong>security</strong> policy. 85% of 9.31respondents have set up an intranet site that providesguidance to staff on information <strong>security</strong> matters. These 8.76techniques are low cost <strong>and</strong> so <strong>the</strong>re is no reason not touse <strong>the</strong>m.7.12However, many respondents believe policies, 6.57h<strong>and</strong>books<strong>and</strong> guidance alone are not an effective way to improve<strong>awareness</strong>. It is simply unrealistic to 5.66 expect most staff toread <strong>and</strong> absorb all <strong>the</strong> information <strong>the</strong>y are bombardedwith. These techniques serve a useful 5.47role in underpinning<strong>and</strong> reinforcing o<strong>the</strong>r <strong>awareness</strong> raising activities.4.93However, alone <strong>the</strong>y are not effective ways to change staffbehaviour.4.38Respondents find classroom training to be <strong>the</strong> most4.38effective technique to change <strong>the</strong> way people behave.72% include <strong>security</strong> messages 4.38in induction training fornew staff. This reaches <strong>the</strong> highest risk people (newjoiners) <strong>and</strong> is relatively low 4.01 cost, since <strong>security</strong> aspectscan be incorporated into existing events.3.833.28While 10.77 classroom training is considered highly effective,relatively few respondents carry out ongoing training for10.4existing staff. This could be due to <strong>the</strong> perceived cost ofarranging <strong>and</strong> running <strong>the</strong>se courses. Time is a preciouscommodity to busy business people. Getting sufficienttime to cover training needs may be very difficult. Themost effective <strong>awareness</strong> programmes appear to bethose that target <strong>the</strong>ir limited classroom training budget at<strong>the</strong> highest risk populations. Blanket classroom trainingappears unlikely to be cost-effective.Instead, half of respondents are using CBT, <strong>and</strong> twothirds of <strong>the</strong>se have m<strong>and</strong>ated it to all staff. While <strong>the</strong>re isan investment cost in setting up CBT, once it is running,<strong>the</strong> delivery costs are very low. It, <strong>the</strong>refore, lends itselfwell to ongoing training to a large population of existingusers. Consistency of delivery is usually better than withlarge classroom training programmes. Building tests into<strong>the</strong> CBT also allows some measurement of how wellrecipients have absorbed <strong>the</strong> training.What techniques have you used to make staff aware of information <strong>security</strong> issues <strong>and</strong> <strong>the</strong>ir obligations?1.462.742.55A formally documented <strong>security</strong> policy has been published outlining <strong>security</strong>safeguardsIntranet site provides guidance on information <strong>security</strong> mattersSecurity requirements are covered in staff h<strong>and</strong>book or procedures manualsSecurity <strong>awareness</strong> training is built into <strong>the</strong> induction process when new staffjoin <strong>the</strong> organisationSecurity responsibilities are included in contract or letter of appointment fornew staffA specific document/leaflet (that covers information <strong>security</strong> policy) isdistributed to staffPoster campaigns on information <strong>security</strong> topicsFormal communication plan (i.e. how you will communicate with staff oninformation <strong>security</strong> <strong>awareness</strong>)Regular email or newsletter distributed to staffFormal analysis of target groups (i.e. which staff it is important to ensue havegood information <strong>security</strong> <strong>awareness</strong>)O<strong>the</strong>r promotional material (e.g. screensavers, pens, mouse mats)Security messages are integrated into existing business training courses thatstaff attendOptional computer-based <strong>security</strong> <strong>awareness</strong> trainingM<strong>and</strong>atory computer-based <strong>security</strong> <strong>awareness</strong> trainingOptional classroom <strong>security</strong> <strong>awareness</strong> training27%36%36%33%31%40%36%46%45%54%58%72%76%88%85%Quizzes on <strong>security</strong> matters (e.g. offering prizes) in staff magazinesUse of external expertise (e.g. <strong>security</strong> <strong>awareness</strong> training vendors)M<strong>and</strong>atory classroom <strong>security</strong> <strong>awareness</strong> training12%22%21%<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong> measurement of success 11


Approaches to raise <strong>awareness</strong>Retailer – fitting in with <strong>the</strong> cultureA large retailer explained why being flexible in <strong>the</strong>approach to information <strong>security</strong> <strong>awareness</strong> is important.They h<strong>and</strong>le large volumes of information aboutcustomers, such as <strong>the</strong>ir financial <strong>and</strong> credit card details.However, <strong>the</strong> retail sector does not have as strong acompliance culture as many o<strong>the</strong>r industry sectorsalthough Data Protection <strong>and</strong> PCI compliance are key.The diverse nature of <strong>the</strong> work force makes delivering aneffective <strong>awareness</strong> programme challenging. The level ofcomputer literacy varies widely <strong>and</strong> <strong>the</strong> age of staff rangesfrom school leavers to retirement age. Messages needto be tailored accordingly. Staff broadly comprise of threedifferent groups. Firstly, in shops <strong>and</strong> outlets, staff dealwith customers <strong>and</strong> use tills <strong>and</strong> stock systems <strong>and</strong> havegenerally less IT experience. Secondly, most back officestaff <strong>and</strong> Head Office staff are ordinary users of computerequipment. Finally, <strong>the</strong> technical teams within IT that havepowerful access rights.A risk-based approach is used to define messages. Thekey risks that are present for each group of users areanalysed. Based on this, key messages for each year areidentified <strong>and</strong> communication plans put in place. Eachgroup faces different risks, so <strong>the</strong> messages for eachgroup are different.A wide range of techniques are used due to <strong>the</strong> diversityof <strong>the</strong> staff. <strong>Information</strong> <strong>security</strong> is built into staff inductiontraining; this ensures that people are informed of <strong>the</strong>irresponsibilities as <strong>the</strong>y join. In store outlets posters havebeen particularly effective with good feedback from staff.In <strong>the</strong> last campaign, <strong>security</strong> messages were tied intoano<strong>the</strong>r campaign running at <strong>the</strong> time <strong>and</strong> this approachwas effective. Using similar presentation of <strong>the</strong> informationfor both campaigns helped get a consistent messageacross to staff. Security needs to be part of, not separatefrom, <strong>the</strong> rest of <strong>the</strong> business.Face-to-face methods to promote <strong>awareness</strong> are notwidely used to raise <strong>security</strong> <strong>awareness</strong> within <strong>the</strong>organisation especially within <strong>the</strong> store outlets. Given <strong>the</strong>large number of staff who use computers relatively little in<strong>the</strong>se locations, classroom training tends not to be costeffective.Cultural issues also have a big impact on <strong>the</strong> techniquesused to raise <strong>awareness</strong>. People do not expect to readlong policies or complex h<strong>and</strong>books. What works insteadis delivering <strong>the</strong> key messages in a short snappy stylefor example via leaflets or posters or computer-basedtraining (CBT). Being sensitive <strong>and</strong> aware of what isappropriate for <strong>the</strong> organisation has improved delivery of<strong>the</strong> messages.Baseline <strong>awareness</strong> is reinforced by m<strong>and</strong>atory CBTwithin <strong>the</strong> Head Offices. The CBT includes tests; <strong>the</strong>test scores are monitored. Surveys have been used tomeasure <strong>the</strong> success of campaigns; <strong>the</strong> number of staffknowing key messages is measured before <strong>and</strong> after<strong>the</strong> campaign. This information is <strong>the</strong>n used to refine <strong>the</strong>programme.What techniques have proved effective at raisingMost effectiveinformation <strong>security</strong> <strong>awareness</strong>?Least effectiveClassroom training-214Induction process/appointment letterSecurity policy/staff h<strong>and</strong>bookPoster campaignsRegular email or newsletterComputer-based trainingLeafletsIntranet siteQuizzes-9Promotional material (e.g. pens)-5-5Part of running an effective programme is targeting<strong>the</strong> right messages to <strong>the</strong> right people. This involvesunderst<strong>and</strong>ing each group’s current information <strong>security</strong>issues <strong>and</strong> <strong>the</strong> extent to which <strong>the</strong>y are aware of <strong>the</strong>m.Surprisingly, only 36% of respondents have any formal-4-1-3-1-3-222233469Most effectiveLeast effectivemechanism for doing this. This happens more often withinfinancial services than o<strong>the</strong>r sectors. Many financialservices providers have learned <strong>the</strong> hard way that it ispossible to spend large sums of money on indiscriminate<strong>awareness</strong> activities without having much impact on <strong>the</strong>overall risk profile. They now use a combination of blanketcoverage basic disciplines <strong>and</strong> target extra activity on <strong>the</strong>areas of greatest risk.Poster campaigns, promotional materials (such as pens)<strong>and</strong> blanket emails are each used by a significant numberof respondents. Many respondents had used <strong>the</strong>setechniques in <strong>the</strong> past but have now ab<strong>and</strong>oned or scaledback <strong>the</strong>ir use. They have a relatively short shelf-life <strong>and</strong>can be expensive to distribute across <strong>the</strong> organisation.There is also a limit to how much information <strong>the</strong>y canconvey to <strong>the</strong> reader, <strong>and</strong> many people simply ignore <strong>the</strong>mcompletely.One in five respondents use surveys <strong>and</strong> quizzes to drumup interest <strong>and</strong> raise <strong>awareness</strong>. Of those that have tried<strong>the</strong>m in <strong>the</strong> past, more respondents found <strong>the</strong>m effectivethan not. The proper use of incentives can achieve hightake-up <strong>and</strong> can really get people thinking about <strong>the</strong>irbehaviours.Implementing a successful <strong>security</strong> <strong>awareness</strong> programmecan be a difficult task. There may be some large or12 ENISA – <strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:


seemingly insurmountable barriers along <strong>the</strong> way.What is most effective in <strong>the</strong> long term is being able torecognise any particular limitations in your efforts, suchas a lack of senior management buy-in or a culturalresistance within <strong>the</strong> organisation. Recognising potentialhurdles beforeh<strong>and</strong> will enable plans to be put in place toovercome <strong>the</strong>se obstacles.Law enforcement agency – ISOst<strong>and</strong>ards can helpA law enforcement agency explained why putting inplace information <strong>security</strong> controls in line with ISO27001 has helped with <strong>awareness</strong>.They store <strong>and</strong> process information that could result inpeople’s lives being put at risk if compromised. As useof IT systems has increased over <strong>the</strong> years, <strong>the</strong> needfor information <strong>security</strong> has risen.Putting in place a structured approach from <strong>the</strong> startwas very important. Government guidelines <strong>and</strong>industry good <strong>practice</strong> was combined to create newpolicies. A dedicated information <strong>security</strong> function wascreated.The initial adoption of new policies <strong>and</strong> proceduresbrought into focus areas where staff were not awareof <strong>the</strong> <strong>security</strong> risks. People started asking questions:Why change? Were <strong>the</strong> new procedures necessary?This showed that <strong>the</strong> existing training in <strong>the</strong>se areaswas not sufficient. Based on this, <strong>the</strong> training <strong>and</strong><strong>awareness</strong> programmes with HR were reviewed. Morerigorous risk focused inductions <strong>and</strong> training were putin place.Changes since <strong>the</strong> initial rollout are creatingnew challenges. Public sector organisations areincreasingly networked. <strong>Information</strong> is being sharedwith o<strong>the</strong>r departments. This makes <strong>security</strong> evenmore important. The agency’s primary focus is tocomply with government legislation <strong>and</strong> guidelines.The agency also reports on compliance with <strong>the</strong> ISO27001 st<strong>and</strong>ard to <strong>the</strong>ir regulatory body.Formal face-to-face training sessions have proved tobe <strong>the</strong> most effective way to raise <strong>awareness</strong>. Theyallow staff to get to know people within <strong>the</strong> information<strong>security</strong> function; <strong>the</strong>y also enable <strong>the</strong> material to beput across in a more relevant way. Discussion getspeople to think about risks <strong>and</strong> different situations;this has been very useful in challenging <strong>and</strong> ultimatelychanging behaviours.Recently, computer-based training has beencommissioned. This will be m<strong>and</strong>atory - all peoplewithin <strong>the</strong> agency will have to complete it. Testsbuilt into <strong>the</strong> training will check users’ underst<strong>and</strong>ing<strong>and</strong> <strong>the</strong> delivery of key messages. Results will beanalysed; <strong>awareness</strong> training strategies <strong>and</strong> materialswill <strong>the</strong>n be tailored to address any knowledge gapsidentified.Financial services group –reducing <strong>the</strong> training burden onstaffA large financial services company explained thatinformation <strong>security</strong> <strong>awareness</strong> has a high priority. Itis on <strong>the</strong> board’s agenda; <strong>the</strong>y see it as important toretaining <strong>the</strong> trust of customers.One challenge is <strong>the</strong> high percentage of parttime staff <strong>and</strong> contractors. Ano<strong>the</strong>r is <strong>the</strong> existingm<strong>and</strong>atory training burden on staff (anti-moneylaundering, data protection, anti-fraud, etc.).Linking information <strong>security</strong> <strong>awareness</strong> traininginto o<strong>the</strong>r on-<strong>the</strong>-job training activities has provedvital. The company has recently restructured its<strong>security</strong> function to bring toge<strong>the</strong>r physical <strong>security</strong>,information <strong>security</strong> <strong>and</strong> fraud prevention. The key<strong>awareness</strong> issues from each of <strong>the</strong>se aspects arecombined <strong>and</strong> distilled into a single set of trainingmessages.Staff show good underst<strong>and</strong>ing of some <strong>security</strong>issues, such as email <strong>and</strong> mobile devices (phones<strong>and</strong> lap top computers etc.). Getting messagesacross in o<strong>the</strong>r areas (such as Internet-relatedthreats <strong>and</strong> instant messaging) has proved harder.The <strong>awareness</strong> training clearly explains eachindividual’s personal responsibilities for information<strong>security</strong>. It <strong>the</strong>n provides guidance on good<strong>practice</strong>s <strong>the</strong> individual can adopt to discharge thoseresponsibilities.The business dem<strong>and</strong>s training to be availableas required <strong>and</strong> in a cost-effective way. To meet<strong>the</strong>se dem<strong>and</strong>s, <strong>the</strong>re is a drive to deliver <strong>security</strong><strong>awareness</strong> through on-line systems <strong>and</strong> self training.Completion of computer-based training (CBT) is nowm<strong>and</strong>atory. Quizzes in <strong>the</strong> CBT provide statisticsthat measure <strong>the</strong> levels of <strong>awareness</strong>; <strong>the</strong> CBT itselfrecords <strong>the</strong> extent to which staff have been trained.The speed, ease of use <strong>and</strong> consistency of <strong>the</strong> onlinetraining programme are seen as key benefits.While <strong>the</strong> set-up has involved some investment,<strong>the</strong> efficiency of training delivery achieved hasmaximised <strong>the</strong> return on this investment.O<strong>the</strong>r measures that have proved helpful in trackingstaff <strong>awareness</strong> include <strong>the</strong> number of mobiledevices lost, <strong>and</strong> <strong>the</strong> number of concerns <strong>and</strong><strong>security</strong>-related incidents reported.The content of CBT training is continually reviewed,so that it reflects emerging risks <strong>and</strong> staff continueto see <strong>the</strong> benefits. The next stage will be to targethigh risk groups for additional face-to-face <strong>security</strong><strong>awareness</strong> training.<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong> measurement of success 13


Measuring <strong>the</strong>effectivenessof <strong>awareness</strong>programmesMany business leaders have observed that “what getsmeasured gets done”. Ultimately, information <strong>security</strong><strong>awareness</strong> is about people’s behaviours. These arealways hard to measure, so this is a challenging area formost organisations.Different organisations adopt different methods ofassessing <strong>the</strong> effectiveness of information <strong>security</strong><strong>awareness</strong> activities. These include both quantitative <strong>and</strong>qualitative approaches. In general, <strong>the</strong>re are four mainapproaches, each with different performance indicators:1. Process improvementThis approach assesses <strong>the</strong> effectiveness of <strong>the</strong>programme by looking at its activities. In o<strong>the</strong>r words,<strong>the</strong>se measures are around <strong>the</strong> effort put into <strong>the</strong>programme; <strong>the</strong>y do not directly measure whe<strong>the</strong>r <strong>the</strong> endresult has improved <strong>security</strong>.Possible performance indicators include:• The extent of development of <strong>security</strong> guidelines.For example, people can assess how well <strong>security</strong>guidelines address <strong>the</strong> main <strong>security</strong> risks ortechnology platforms;• The extent to which <strong>the</strong> guidance is disseminated.Typical metrics are <strong>the</strong> number of leaflets distributed,visitors to <strong>the</strong> intranet site, or staff receiving <strong>awareness</strong>training;• The efficiency of <strong>the</strong> <strong>awareness</strong> process. The normalmeasure is <strong>the</strong> cost of delivery, e.g. cost (in time <strong>and</strong>expenses) per person trained;• The relevance of <strong>the</strong> <strong>awareness</strong> material. A simplemeasure here is <strong>the</strong> frequency with which it is updated;<strong>and</strong>• The effectiveness of <strong>the</strong> deployment of <strong>the</strong> <strong>security</strong>guidelines. Surveys that ask staff whe<strong>the</strong>r <strong>the</strong>y areaware of guidelines <strong>and</strong> know what procedures tofollow are one way to measure this.14 ENISA – <strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:


The advantage of process improvement measures is that<strong>the</strong>y are easy to define <strong>and</strong> to ga<strong>the</strong>r.The disadvantage is that <strong>the</strong>y provide only indirect comfortas to whe<strong>the</strong>r <strong>the</strong> programme is making <strong>the</strong> organisationany more secure.2. Attack resistanceThis approach focuses on measuring how resistant staffare to a potential attack. Possible performance indicatorsinclude:• The extent to which staff recognise attacks. Thisnormally involves asking specific questions in a staffsurvey, quiz or computer-based test; <strong>and</strong>• The extent to which staff fall prey to attacks. Simulatedattacks, such as emails containing executables orpeople phoning up to ask staff for <strong>the</strong>ir passwords, arehelpful here.The advantage of attack resistance measures is that <strong>the</strong>yprovide some direct evidence of <strong>the</strong> actual state of staff<strong>awareness</strong>. They tend to be good for impressing seniormanagement on <strong>the</strong> need for investment in <strong>security</strong><strong>awareness</strong>.The main disadvantage is that <strong>the</strong>re are potentially manyattack scenarios; any individual measure will be quitespecific to <strong>the</strong> scenario it is testing. Simulated testscan also be relatively expensive to set up. A risk-basedapproach can help overcome <strong>the</strong>se issues.3. Efficiency <strong>and</strong> effectivenessThis approach focuses on <strong>the</strong> actual experience of<strong>security</strong> incidents within <strong>the</strong> organisation. Possibleperformance indicators include:• The extent of <strong>security</strong> incidents arising from humanbehaviour. Typical metrics include <strong>the</strong> number <strong>and</strong> costof those incidents. Some organisations also consider<strong>the</strong> proportion of <strong>security</strong> incidents arising from humanbehaviour;• The extent of downtime arising from human behaviour.This is a particular concern in sectors where availabilityof systems is critical; <strong>and</strong>• The extent to which human behaviour caused <strong>the</strong>organisation’s most severe incidents. Root causeanalysis into serious incidents provides this data; <strong>the</strong>measure is normally <strong>the</strong>n expressed as a proportion of<strong>the</strong> total number of serious incidents.Airport operator – <strong>the</strong> role ofmetrics <strong>and</strong> auditThe operator of an airport is subject to anincreasing threat from terrorists <strong>and</strong> o<strong>the</strong>r maliciousattacks. They regularly transfer large volumesof information between <strong>the</strong>ir systems <strong>and</strong> thirdparties. Their key control systems are networked.All of this means information <strong>security</strong> is of criticalimportance to <strong>the</strong>ir business.They employ a large number of staff from diversebackgrounds, including lots of temporary <strong>and</strong>contracting staff. As a result, <strong>the</strong>y choose touse a wide range of techniques to raise <strong>security</strong><strong>awareness</strong>. Since some of <strong>the</strong> staff are not verycomputer literate, regular topical emails <strong>and</strong>communications have proved very effective.Monitoring incidents within <strong>and</strong> outside <strong>the</strong>organisation allows staff to provide up-to-dateguidance.They have implemented polices <strong>and</strong> proceduresin line with ISO st<strong>and</strong>ards. This has not, on itsown, improved <strong>awareness</strong>. Policy is a necessarycomponent of <strong>the</strong> framework for control, but issimply not very exciting to staff.Where practical, requirements from <strong>the</strong> policieshave been built into electronic or automatedprocesses. These help staff comply with policy, <strong>and</strong>produce better activity logs than equivalent manualprocesses. Reviewing <strong>the</strong>se logs is a quick way tocheck people’s behaviours against policy.Internal <strong>and</strong> external audits have played amajor role in examining behaviour <strong>and</strong> checkingadherence to process <strong>and</strong> policy. The audits havesuccessfully highlighted areas where <strong>awareness</strong>of good <strong>practice</strong> or policy has been lacking. Sinceaudit reports go to senior management deficienciesare taken seriously. This makes <strong>the</strong> approval ofnew <strong>security</strong> <strong>initiatives</strong> <strong>and</strong> <strong>awareness</strong> training gomore smoothly.Tracking incidents also sheds light on <strong>awareness</strong>levels. Investigating <strong>the</strong> root causes of incidents<strong>and</strong> downtime has highlighted trends in behaviours.These are <strong>the</strong>n analysed to identify any particulargaps in <strong>awareness</strong> or training <strong>and</strong> <strong>the</strong>n addressedin <strong>the</strong> planning of future <strong>awareness</strong> <strong>initiatives</strong>.<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong> measurement of success 15


Measuring <strong>the</strong> effectiveness of <strong>awareness</strong> programmesGovernment – get safe onlineA government department explained how on-line systemsare increasingly used to deliver public services. Security isessential to maintaining citizens’ trust in <strong>the</strong> continued useof <strong>the</strong>se <strong>and</strong> future technologies. The government wantsto ensure that <strong>the</strong> country is a ‘secure’ place to be online<strong>and</strong> so is keen that people are aware of <strong>the</strong> associated<strong>security</strong> threats. Good information <strong>security</strong> is viewed asbeing increasingly important to <strong>the</strong> success <strong>and</strong> stabilityof <strong>the</strong> country as a whole.The threats are growing rapidly, with e-crime doublingroughly every 18 months. A recent survey showed thatone in ten people had suffered Internet fraud losing 1,200euros each on average. While often banks ra<strong>the</strong>r thancitizens take <strong>the</strong>se losses, individuals affected by identity<strong>the</strong>ft suffer a great deal of disruption to <strong>the</strong>ir personallife. To reduce this, <strong>the</strong> government aims to make peoplemore aware of <strong>the</strong> risks to <strong>the</strong>ir electronic information, beit <strong>the</strong>ir credit card or social <strong>security</strong> details.Within <strong>the</strong> general public, <strong>the</strong>re is a diverse range ofpeople to reach. Different techniques work well ondifferent audience groups. The level of prior knowledge<strong>and</strong> age are useful ways of categorising <strong>the</strong> audience.Overall, many different techniques are used to increase<strong>awareness</strong>. Some of <strong>the</strong> most successful campaignelements have been websites, phone-ins, conductingonline <strong>and</strong> offline quizzes <strong>and</strong> email newsletters. Thesehave been very good at grabbing people’s attention <strong>and</strong>getting across key messages.Measurement is critical to ensuring <strong>the</strong> campaigns aredelivering <strong>the</strong> right messages <strong>and</strong> working as intended.Surveys measure behaviours <strong>and</strong> perceptions before<strong>and</strong> after <strong>the</strong> campaigns. These immediately highlightdifferences <strong>and</strong> shed light on <strong>the</strong> effectiveness <strong>and</strong> impactof <strong>the</strong> campaign.A big challenge is retaining <strong>the</strong> right balance in <strong>the</strong>content. The purpose of <strong>awareness</strong> is not to scare people,but to educate <strong>the</strong>m <strong>and</strong> change <strong>the</strong>ir behaviour. Thecontent <strong>and</strong> distribution methods also need to remainrelevant in <strong>the</strong> face of a rapidly changing environment.It is important that <strong>the</strong>re is a joint government <strong>and</strong> industryapproach to promoting Internet safety. Government isnot solely responsible for keeping people safe online– industry must also accept responsibility for <strong>the</strong> safetyof <strong>the</strong>ir customers to assure <strong>the</strong> continuing growth of e-commerce.The advantage of <strong>the</strong>se metrics is twofold: firstly, <strong>the</strong> datacan be ga<strong>the</strong>red through <strong>the</strong> overall <strong>security</strong> incidentmonitoring that most information <strong>security</strong> groups doanyway; secondly, <strong>the</strong>se statistics are usually of greatinterest to senior management.The disadvantage is that <strong>the</strong>y do not necessarily give atrue reflection of <strong>security</strong> <strong>awareness</strong>. It is not just <strong>security</strong><strong>awareness</strong> that determines whe<strong>the</strong>r incidents occur; <strong>the</strong>extent to which attacks actually occur is <strong>the</strong> main factor.In <strong>the</strong> long term, <strong>the</strong> trend can be a good indicator of<strong>awareness</strong>. In <strong>practice</strong>, however, people often take actionbased on individual incidents; this may not be <strong>the</strong> mosteffective approach.4. Internal ProtectionsThis category is concerned with how well an individual isprotected against potential threats. In o<strong>the</strong>r words, has<strong>the</strong> individual’s <strong>awareness</strong> resulted in secure behaviour?Possible performance indicators include:• The extent to which individuals incorporate <strong>security</strong> into<strong>the</strong> development <strong>and</strong> acquisition of systems. This canbe measured by reviewing a sample of business cases<strong>and</strong> requirements specifications;• The extent to which individuals protect <strong>the</strong>ir data files.Scanning tools can be used to build up a picture of this;• The extent to which individuals have allowed <strong>the</strong>irsystems to be infected by viruses or o<strong>the</strong>r malicioussoftware. Normally anti-virus activities can providestatistics on this; <strong>and</strong>• The extent to which individuals have allowed <strong>the</strong>irsystems to harbour inappropriate (e.g. pornographic)material or unauthorised (e.g. pirated) software. Thereare specific scanning tools that can quickly measurethis.The advantage of <strong>the</strong>se measures is that <strong>the</strong>y providedirect evidence of staff behaviours. They assess whe<strong>the</strong>r<strong>awareness</strong> is making <strong>the</strong> organisation more secure <strong>and</strong>avoid hypo<strong>the</strong>ses or extrapolation. In addition, existingaudits (by internal or external auditors) may providefeedback here, effectively for free.The disadvantage is that any individual measure isquite specific to <strong>the</strong> behaviour it is measuring. Often, an<strong>awareness</strong> programme aims to change many behaviours.This can result in many potential metrics. Each, in turn,may require investment in scanning tools or audits. A riskbasedor rotational approach can help reduce <strong>the</strong> ongoingcost.Most organisations use a combination of several of <strong>the</strong>16 ENISA – <strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:


four approaches. Blending different metrics enables <strong>the</strong>mto build up a balanced scorecard for <strong>the</strong>ir <strong>awareness</strong>programme. Decisions are based on <strong>the</strong> overall picture,ra<strong>the</strong>r than on any single measure.The respondents in this study use a wide variety ofdifferent methods to measure <strong>the</strong> effectiveness of <strong>the</strong>irinformation <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>. All of <strong>the</strong>measures prompted in our questionnaire have someadvocates.Measures of internal protection are <strong>the</strong> most popularoverall. Two thirds of respondents use policy breacheshighlighted in (external or internal) audit reports as ameasure. The audits can be undertaken by membersof internal teams or may be as a result of external orthird party audits. The auditors’ objective <strong>and</strong> systematicapproach is felt to make <strong>the</strong>se reports reliable sourcesof information. In addition, nearly a third of respondentsuse <strong>the</strong> results of software scans as a metric for <strong>the</strong>effectiveness of <strong>the</strong>ir <strong>awareness</strong> programme. Somepossible metrics (such as <strong>the</strong> proportion of systems thatare made with <strong>security</strong> in mind) are hardly used.Efficiency <strong>and</strong> effectiveness measures are <strong>the</strong> next mostpopular. Many respondents use <strong>the</strong>ir experience of <strong>security</strong>incidents. The most common metrics are <strong>the</strong> number ofincidents caused by human behaviour <strong>and</strong> root causeanalysis of <strong>the</strong> most serious incidents; more than half ofrespondents use each of <strong>the</strong>se. A third also consider <strong>the</strong>proportion of incidents caused by human behaviour. Fewerrespondents track cost of incidents, but many of those thatdo believe this is one of <strong>the</strong>ir most important metrics.A significant minority of respondents use some form ofattack resistance metrics. A third include questions on<strong>security</strong> <strong>awareness</strong> in staff surveys. They <strong>the</strong>n measure<strong>awareness</strong> levels before <strong>and</strong> after <strong>initiatives</strong> take place.However, some respondents highlight issues with <strong>the</strong>complexity of collecting <strong>and</strong> processing this data. A quarterof all respondents carry out tests to check whe<strong>the</strong>r staffbehave in <strong>the</strong> right way when presented with a possiblethreat.International commercial bank – measuring is critical to targeting effortsA large commercial bank has a central information<strong>security</strong> function. This team is responsible for driving<strong>awareness</strong> training across <strong>the</strong> world. They aim toget basic messages about <strong>security</strong> across to a large,geographically dispersed audience. They also need tosend specific messages to smaller groups of staff withkey roles in systems or <strong>security</strong>.A big challenge faced by <strong>the</strong> bank has been how tomeasure <strong>awareness</strong> levels <strong>and</strong> <strong>the</strong> effectiveness ofits <strong>awareness</strong> programme. Ideally, <strong>the</strong> bank wantsto measure <strong>the</strong> change in people’s behaviours.This is difficult to assess quantitatively. However,measurement is critical to targeting training efforts atweak areas, so <strong>the</strong> bank has invested in identifyingpractical metrics <strong>and</strong> key performance indicators.A particularly successful technique has been <strong>the</strong> useof computer-based training (CBT). A centralised CBTlibrary includes training courses <strong>and</strong> captures testresults from <strong>the</strong> automated testing of staff. All newemployees must complete <strong>the</strong> training as part of <strong>the</strong>irinduction. The training is updated regularly, <strong>and</strong> all staffmust complete <strong>the</strong> updated training. Reports analyse<strong>the</strong> extent of completion of CBT training <strong>and</strong> <strong>the</strong> scoresin tests; <strong>the</strong> central team monitor <strong>the</strong>se <strong>and</strong> act on anysignificant trends.Password scans provide a useful direct quantitativemeasure of <strong>the</strong> attitude <strong>and</strong> behaviour of staff. Thebank periodically runs software that scans passwordfiles on key systems <strong>and</strong> analyses <strong>the</strong> strength ofindividual passwords. The number of staff using easilyguessable passwords is a key indicator of <strong>security</strong><strong>awareness</strong>.O<strong>the</strong>r techniques that have proved effective includesimulated phishing emails <strong>and</strong> competitions. Thesehave made <strong>the</strong> targeted staff think carefully about why<strong>the</strong>y are asked to be secure. They have also providedhelpful statistics for trend analysis.There are plans to introduce a new survey to gauge <strong>the</strong>level of <strong>security</strong> <strong>awareness</strong> <strong>and</strong> behaviours within <strong>the</strong>bank. An independent third party will ga<strong>the</strong>r responsesfrom a r<strong>and</strong>om sample of staff (ra<strong>the</strong>r than self-select).This will enable <strong>the</strong> bank to use <strong>the</strong> survey results todraw statistically valid conclusions across <strong>the</strong> business.Initially, <strong>the</strong> bank monitored incidents to assess <strong>security</strong><strong>awareness</strong>. However, root cause analysis has shown<strong>the</strong>re are many different factors behind each incident,so <strong>the</strong> number of incidents is not a true reflectionof <strong>security</strong> <strong>awareness</strong>. In addition, <strong>the</strong> frequency ofincidents is so low that trend analysis is not meaningful.For <strong>the</strong>se reasons, incident statistics are no longerused to measure <strong>awareness</strong>.<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong> measurement of success 17


Measuring <strong>the</strong> effectiveness of <strong>awareness</strong> programmesPublic department – blocking <strong>and</strong> monitoringA government department explained why enforcingpolicy <strong>and</strong> measuring people’s behaviours are critical togood <strong>security</strong> <strong>awareness</strong>. Security of <strong>the</strong> personal data<strong>the</strong>y store <strong>and</strong> process is vital to maintaining <strong>the</strong> publictrust. The time sensitivity of this information is higherthan in most private companies. Threats to it, fromforeign governments, criminals, <strong>and</strong> journalists, arenumerous. To maintain <strong>security</strong>, <strong>the</strong> department needsa rigorous, comprehensive control <strong>and</strong> <strong>awareness</strong>framework.One challenge <strong>the</strong>y face is a high turnover of staff, 30-40% per year. With so many transient staff, maintainingeffective <strong>awareness</strong> is difficult. A key technique to dothis is <strong>the</strong> use of comprehensive induction training.This covers important topics including data privacy <strong>and</strong>information <strong>security</strong>. Staff have to sign to confirm <strong>the</strong>yunderst<strong>and</strong> <strong>and</strong> will abide by <strong>the</strong> department’s policies.Cost effectiveness drives <strong>the</strong> approach adopted to raise<strong>awareness</strong>. The use of intranet sites <strong>and</strong> emails havebeen effective. These are instantly available to staff;<strong>the</strong>y can convey important messages quickly <strong>and</strong> to awide audience. Surveys were used in <strong>the</strong> past to gauge<strong>awareness</strong>; however, response was low <strong>and</strong> <strong>the</strong> resultsdid not always provide <strong>the</strong> required information.Where possible, information <strong>security</strong> requirements areautomated, i.e. built into systems. Manual spot checksare also used, targeted at high risk systems <strong>and</strong> areas.Penetration testing <strong>and</strong> social engineering are usedto assess people’s actual behaviours. In addition, toensure staff are following policy, a r<strong>and</strong>om sample ofusers’ emails are audited. Based on <strong>the</strong>se, a ‘<strong>security</strong>league table’ report is sent to management. Thisencourages people to improve <strong>the</strong>ir areas. Wherespecific weaknesses are found, <strong>the</strong>y are addressedwith targeted training.Incidents are also tracked. Due to <strong>the</strong> relatively lownumbers of events, slight increases can be easily seen<strong>and</strong> analysed. The results are used to target fur<strong>the</strong>r<strong>awareness</strong> training if any trends are found. Previousanalysis showed that new joiners had lower <strong>awareness</strong><strong>and</strong> changes were made to induction training toaddress this. Fur<strong>the</strong>r monitoring of <strong>the</strong> <strong>awareness</strong> isaccomplished through yearly audits for compliance withISO 27001.How do you measure <strong>the</strong> level of information <strong>security</strong> <strong>awareness</strong> in your organisation?Results of audits (by internal or external auditors)66%Number of <strong>security</strong> incidents due to human behaviourThe root causes of <strong>the</strong> most serious incidents54%58%Proportion of <strong>security</strong> incidents due to human behaviourNumber of staff successfully completing <strong>awareness</strong> trainingcoursesResults of staff <strong>security</strong> surveysResults of scans for viruses <strong>and</strong> unauthorised softwareQualitative feedback from focus groups or staffCost of <strong>security</strong> incidents reported due to human behaviourProportion of downtime due to human behaviourTesting whe<strong>the</strong>r staff follow correct proceduresNumber of visitors to <strong>security</strong> intranet websiteResults of periodic self-assessments by managementProportion of purchases that have been made with <strong>security</strong> inmindDistribution of <strong>security</strong> policy or leaflets6%4%37%36%34%31%28%27%27%25%22%19%18 ENISA – <strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:


Given <strong>the</strong> ease with which process improvement measurescan be captured, <strong>the</strong> number of respondents using <strong>the</strong>m islow. Ideally, respondents would like to be able to measureactual changes in staff behaviours resulting from <strong>the</strong><strong>awareness</strong> activities. As a consequence, relatively fewrespondents find input metrics (e.g. number of visitors tointranet site, number of leaflets distributed) helpful. Themost used measures of this type are <strong>the</strong> number of staffreceiving training <strong>and</strong> qualitative feedback from staff on <strong>the</strong>programme; roughly a third of respondents used each of<strong>the</strong>se metrics.There is little consensus among respondents on <strong>the</strong> mosteffective measures. This is clearly an area where good<strong>practice</strong> is evolving.Even <strong>the</strong> most popular metrics had been found wantingin some organisations. For example, many respondentshave ab<strong>and</strong>oned <strong>security</strong> incident statistics as a measureof <strong>security</strong> <strong>awareness</strong>. One reason is that <strong>the</strong>re are manyo<strong>the</strong>r factors driving <strong>the</strong> number of <strong>security</strong> incidents.Ano<strong>the</strong>r is that <strong>the</strong> volume is (mercifully) low <strong>and</strong> hencespiky in nature; this makes trend analysis difficult.Overall, <strong>the</strong>re was a good correlation between <strong>the</strong> metricsthat were highlighted as most effective <strong>and</strong> <strong>the</strong> mostpopular metrics in actual use across all respondents. As agroup, <strong>the</strong>y seem to have learned a lot over <strong>the</strong> years; <strong>the</strong>irpast experience of what works well has shaped what <strong>the</strong>ydo today. Most respondents acknowledge that <strong>the</strong>y arecontinuing to improve <strong>the</strong>ir approach, but <strong>the</strong>re is much tolearn from what <strong>the</strong>y do today.Generally <strong>the</strong> results did not show significant differencesbetween <strong>the</strong> sectors of respondents. This indicates thatwhat people have found to be effective across industriesis broadly similar. Although one particular item of note wasthat financial services organisations were less likely to usemetrics related to <strong>the</strong> costs of incidents than government,retail, telecommunication <strong>and</strong> utilities.Many respondents have encountered problems in <strong>the</strong>past, putting effective quantitative measures in place. Itis important that <strong>the</strong> method any organisation uses toproduce <strong>and</strong> collect <strong>awareness</strong> indicators addresses <strong>the</strong>secommon issues. The main concerns raised by respondentsin this study include:• Quality <strong>and</strong> comparability issues. A particular issuehere is with staff surveys, where <strong>the</strong> exacting wording<strong>and</strong> <strong>the</strong> placement of <strong>the</strong> question in <strong>the</strong> survey canaffect <strong>the</strong> answers given. Often staff tell surveys what<strong>the</strong>y think management want to hear, not necessarilywhat <strong>the</strong>y really think. Compliance returns from seniormanagement (e.g. self assessments) can also bemisleading; <strong>the</strong> people signing <strong>the</strong> returns are oftendivorced from <strong>the</strong> detail of <strong>the</strong>ir operations <strong>and</strong> so reportwhat <strong>the</strong>y are told by <strong>the</strong>ir teams;• Relevance. It is important not to take <strong>the</strong> wronginference from measures. For example, an increase invirus infection rates may indicate a problem with staff<strong>awareness</strong>, but it could equally be an issue with <strong>the</strong> antivirussoftware. A rise in <strong>security</strong> incidents could indicatea problem with <strong>awareness</strong> (more actual breaches),What metrics have proved effective at measuring <strong>the</strong> success of information <strong>security</strong> <strong>awareness</strong> activities?Number of <strong>security</strong> incidents due to human behaviour-416Audit findings6Results of staff surveys-45Tests of whe<strong>the</strong>r staff follow correct procedures-15Number of staff completing training5Qualitative feedback from staff3Cost of Security incidents due to human behaviour-12Number of visitors to Security Intranet site-12Proportion of downtime due to human behaviour2Results of scans for viruses <strong>and</strong> unauthorised software-21Number of policies/Leaflets distributedReturn on investment-2-2Most effectiveLeast effective<strong>Current</strong> <strong>practice</strong> <strong>and</strong> <strong>the</strong> measurement of success 19


Measuring <strong>the</strong> effectiveness of <strong>awareness</strong> programmesor improved <strong>awareness</strong> (more reporting of <strong>the</strong> samebreaches). The number of leaflets or emails sent outdoes not mean anyone has necessarily read <strong>the</strong>m.Using a portfolio of measures enables sense to be madeout of what can be a confusing picture;• Availability of specific indicators. Some measuresare simply too hard to ga<strong>the</strong>r for <strong>the</strong> payback <strong>the</strong>y give.While in principle, many respondents think return oninvestment is a sensible approach, most find it hardto quantify <strong>the</strong> benefits of better staff <strong>awareness</strong>. In anon-sales environment, estimating <strong>the</strong> cost of <strong>security</strong>breaches can be hard; <strong>and</strong>• Processing. Once data has been collected, it isimportant to process this <strong>and</strong> turn it into meaningfulinformation. The information may need to be editedto remove suspect results (for example, if <strong>the</strong>re is aproblem with a particular training course). Data mayneed to be weighted to reflect better <strong>the</strong> overall staffprofile of <strong>the</strong> organisation. A general rule of thumb isthat <strong>the</strong> less processing <strong>the</strong> better. Some respondents,for example, have ab<strong>and</strong>oned using before <strong>and</strong> aftercomparisons of survey data because of <strong>the</strong> complexityof <strong>the</strong> processing required.In conclusion, <strong>the</strong>re appear to be many reasons whyindividual metrics might be helpful. Some metrics are usedbecause <strong>the</strong>y provide insight into actual behaviours (e.g.scans or tests). O<strong>the</strong>rs are adopted because <strong>the</strong>y resonatewith <strong>the</strong> senior management that sponsor <strong>awareness</strong>programmes (e.g. cost of incidents). O<strong>the</strong>rs are simplyeasily to h<strong>and</strong> <strong>and</strong> require little effort (e.g. results ofaudits).Each organisation needs to find <strong>the</strong> right balance for<strong>the</strong>m; <strong>the</strong>re is no “one size fits all” solution. Keeping <strong>the</strong>approach simple tends to keep it cost-effective. Manycurrently struggle with quantifying <strong>security</strong> <strong>awareness</strong>;however, provided simple mistakes are avoided, abalanced set of metrics can provide real insight into <strong>the</strong>effectiveness of <strong>awareness</strong> programmes. Only with thisinsight are organisations able to change <strong>the</strong>ir programmesfrom a compliance activity to one that really benefits <strong>the</strong>iroperations.An example of a balanced set of key performanceindicators is provided in <strong>the</strong> following table. This combines<strong>the</strong> five most popular measures used by respondents intoan overall <strong>security</strong> <strong>awareness</strong> dashboard. Also listed arecase studies in <strong>the</strong> report where <strong>the</strong>se particular metricsare being used; <strong>the</strong>se include more information about howto use <strong>the</strong>m effectively to assess <strong>the</strong> level of <strong>awareness</strong>.Metric Points to consider Case studiesNumber of Can quickly show trends <strong>and</strong> deviations in behaviour. Financial services group – page 13<strong>security</strong> incidentsCan help underst<strong>and</strong> root causes <strong>and</strong> estimate costs to Airport operator – page 15due to human<strong>the</strong> business.behaviourPublic department – page 18May not be enough incidents to draw meaningful results.May be o<strong>the</strong>r factors that affect <strong>the</strong> incidents.Audit findings Generally conducted by independent <strong>and</strong> knowledgeable International finance services group – page 7people who can provide third party assurance onbehaviours.Airport operator – page 15May be significant areas of <strong>awareness</strong> not reviewed.13.8% Results of staff If used before <strong>and</strong> after specific training, can be used to International insurer – page 6surveysgauge <strong>the</strong> effectiveness of campaigns.International airline – page 9If sufficiently large, can provide statistical conclusions onTelecommunications provider – page 10staff behaviours.Retailer – page 12Need to be targeted at verifying key messages.Government – page 16Have to be carefully designed since staff may respond with‘expected’ answers <strong>and</strong> not true behaviours.Tests ofVery good way of actually measuring behaviours <strong>and</strong> International commercial bank – page 17whe<strong>the</strong>r staff highlighting changes after training.Public department – page 18follow correctHave to be carefully planned <strong>and</strong> carried out since couldproceduresbe breaches of employment <strong>and</strong> data protection laws.Need a big enough sample if results are to be meaningful.Number of staffcompletingtrainingNeed to decide what combination of classroom <strong>and</strong>computer-based training to use.Have to consider what training to make m<strong>and</strong>atory.May need to be tailored for different areas or regions.May need regular <strong>and</strong> potentially costly updates.International finance services group – page 7Retailer – page 12Law enforcement agency – page 13International commercial bank – page 1720 ENISA – <strong>Information</strong> <strong>security</strong> <strong>awareness</strong> <strong>initiatives</strong>:


Legal NoticeNotice must be taken that this publication represents <strong>the</strong> views <strong>and</strong> interpretations of <strong>the</strong> authors <strong>and</strong> editors, unless it isstated o<strong>the</strong>rwise. This publication should not be construed to be an action of ENISA or <strong>the</strong> ENISA bodies unless adoptedpursuant to <strong>the</strong> ENISA Regulation (EC) No 460/2004. This publication does not necessarily represent state-of <strong>the</strong>-art <strong>and</strong> itmight be updated from time to time.Third party sources are quoted as appropriate. ENISA <strong>and</strong> PricewaterhouseCoopers LLP, <strong>the</strong>ir members, employees <strong>and</strong>agents are not responsible for <strong>the</strong> content of <strong>the</strong> external sources including external web sites referenced in this publication.This publication is intended for educational <strong>and</strong> information purposes only. No representation or warranty (express orimplied) is given as to <strong>the</strong> accuracy or completeness of <strong>the</strong> information contained in this article, <strong>and</strong>, to <strong>the</strong> extent permittedby law, ENISA <strong>and</strong> PricewaterhouseCoopers LLP, <strong>the</strong>ir members, employees <strong>and</strong> agents accept no liability, <strong>and</strong> disclaimall responsibility, for <strong>the</strong> consequences of you <strong>and</strong> anyone else acting, refraining from acting, in reliance on <strong>the</strong> informationcontained in this article of for any decision based on it.Reproduction is authorised provided that <strong>the</strong> source is acknowledged.© European Network <strong>and</strong> <strong>Information</strong> Security Agency (ENISA), 2007.


European Network <strong>and</strong> <strong>Information</strong> Security AgencyP.O. Box 130971001 HeraklionGreeceTel: +30 2810 39 1280http://www.enisa.europa.eu

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!