While user education is obviously significant when it comes to cyber security, it should be used to underpin technical controls rather than as a starting point for a security strategy, according to Defence Signals Directorate (DSD) assistant secretary cyber security, Joe Franzi.
Speaking at CeBIT 2013, Franzi said user education should be utilised to value-add to security mitigation after as many security controls as possible are automated.
"If you look at DSD's top 35 strategies to mitigate against targeted cyber intrusions, in the early days around 2010, we had user education at about number eight," he said.
"As we became more experience and knowledgeable as to what was happening in the public and private sector, we realised there are other things that were and should be a higher priority; these have much more affectiveness that what we actually thought about user education."
This is because malicious attackers understand how organisations operate in the contemporary cyber environment, and therefore previously innocent things - like travel itineraries, for example - are becoming a rich ground for attacks.
Franzi claims there are four key questions which organisations must ask in order to strengthen networks and mitigate threats:
- How much time do you take to ensure your networks are secure?
- Do you need to educate your staff in terms of risks in the cyber environment?
- Are you confident you can recover from a critical incident?
- Are you confident your contractors and service providers have their house in order in terms of protecting your information on their networks?
The catch, patch and match
'Catch, patch, match' is a campaign which DSD launched in 2012. It involves an assessment of the top four priorities in its list of 35 mitigation strategies, and reordering them in terms of priorities.
'Catch' is about identifying malicious software with a white list. According to Franzi, an application white list is the number one priority for businesses, and in terms of effectiveness, provides organisations with a significant threat mitigation component.
The next phase is patching apps and operating systems so they remain up to date, at which point matching is introduced. Matching is concerned with pairing the right authorities and accesses with the right people. Franzi said it is about reducing administrative privileges to a bare minimum and ensuring those particular employees do not use those same accounts to access the Internet.
Sign up for Computerworld eNewsletters.