SBN

How to Create a Human Firewall: Top 7 Elements Required for Success in 2018

A robust security system contains more than just hardware or software; there must always be a “wetware” (aka human) defense element as well. A so-called “human firewall” is a concept in security awareness that empowers a team to fight against hackers in a proactive as well as reactive fashion.

In this article we will discuss how to create a human firewall that will serve as your first (and last) line of defense against breaches.

What Is a Human Firewall?

The definition of a human firewall is fairly straightforward. It is essentially a commitment of a group of employees to follow best practices to prevent as well as report any data breaches or suspicious activity. The more employees you have committed to being a part of the firewall, the stronger it gets.

Remember that a human firewall is different from a Security Champion in that Security Champions are more about education and awareness. However, a human firewall can include Security Champions.

The importance of this added human layer of protection lies in the fact that many breaches are due to employee error. The latest report from the Ponemon Institute shows that 25% of successful hacks are caused by carelessness or simple mistakes. Software, too, makes mistakes, sometimes allowing phishing messages through or red-flagging real communications.

Therefore, it is felt that the vigilant human can see potential hazards software misses and can prevent errors from being made. However, to have your firewall be as successful as possible, it’s important that these seven elements are included.

7 Elements required for a successful human firewall

1. Make It Easy

It’s important to have long, detailed security policies that cover everything from password creation to mobile devices. But instead of overwhelming them, have your human firewall focus on strengthening a few weaknesses at a time.

(Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Stephen Moramarco. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/LCiklbRIqMk/

Secure Guardrails