All the firewalls, operating system patches, and defenses are for naught if your agency staff is not properly trained on security protocol - One errant click or opening a file can leave your data vulnerable. Find out the clear steps to train agency staff.
We've broken out sections for New Employees, Existing Employees, and Departing Employees.
I. New Employees Make sure all new employees have signed an ISP (information security policy) and ensure that electronic safety is part of the onboard training.
1. Start with basic computer dos and dont's.
2. Tackle email, flash drives, websites.
3. If there are laptops or tablets, review the check-in procedure.
4. Explain what unusual means when it comes to computer behavior.
5. Passwords - explain the importance of confidentiality, and using a solid password strategy.
6. Review the privacy of data and all information, laws that apply.
Some existing resources are:
ACT's 'Agency Cyber Guide 3.0' a. Perform random, consistent Phishing-testing Known resources are
PhishMe and
KnowBe4.
These send out a customized bogus email that looks authentic but creates reports for leadership analysis and follow-up. The key is to train employee behavior to carefully review every email before opening, thereby reducing risk.
b. Monitor website activity from IT reporting, and limit where ever applicable.
c. Discuss what to look for in emails, websites, social posts, and all electronic interactions.
4. Daily: If a specific risk is identified each department should be notified, and employees should be guided on what happened, what steps are being taken to fix the incident, and what actions
they should avoid.
III. Departing Employees 1. Walk departing employee(s) to the door and check any boxes, etc., even if leaving on good terms.
2. Whether leaving on good terms or not, have one checklist created to ensure everything is covered.
a. Make sure that all passwords are changed prior to an employee walking out the door.
b. Disable access to all information.
c. Ensure agency acquisition of physical security items (paperwork, keys, etc.) is completed.
Authors, Mary-Hauri (Insurance Concepts In Motion, Inc.), Ron Berg (ACT)
Updated Jul 06, 2021