Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page226/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   222   223   224   225   226   227   228   229   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 274 of 425

simulation exercises must be conducted, as they are crucial in providing staff with real experience in dealing with cyber attacks.
798. Make it ongoing – The training should be conducted for all incoming staff and existing employees, and should be regularly updated
64
based on evolving policies and threats. This regular staff engagement ensures that security is at the forefront of their minds, and increases the likelihood that they will understand and adhere to security policies. To assess their understanding of policy, they should be given case studies that allow them to practise identifying and dealing with security threats. In addition, staff should be updated on topical security issues.
799. Sharpen the focus – Instead of trying to tackle dozens of security topics, there should be focus on themes that matter most to the organisation, and which will result in the greatest reduction of risk – keeping in mind that different classes of staff, and different departments, face different risks. If necessary, external vendors can be engaged to help customise training materials for specific needs.
800. Best practice guides indicate that a security awareness programme should train employees on a) secure authentication b) identifying social engineering attacks c) sensitive data handling d) causes of unintentional data exposure and e) identifying and reporting incidents.
64
Ibid at sub-control 17.4.
65
Ibid at sub-controls 17.5 – 17.9.



COI Report – Part VII
Page 275 of 425

801. Use real-life incidents – Concrete examples of breaches and other security headlines should be used in the programme, to add realism and legitimacy to security awareness efforts. As explained by Vivek, sending staff generic messages about cybersecurity and awareness is ineffective – no one reads these messages in the way they should. What works far more effectively is the use of narrative and storytelling – using real experiences and examples of cyber incidents to illustrate the key learning points for staff is more effective as the staff are more likely to read and understand the information provided to them. Moving forward, the Cyber Attack itself can be used as a useful storytelling implement to educate users on many aspects of cyber attacks, including APTs.
802. Test effectiveness of training – Simply waiting fora security breach to test employee readiness cannot be the right strategy. Mock attacks staging simulated social engineering campaigns should be executed, to assess whether the number of staff falling for them is decreasing. Apart from phishing emails that seek to entice users to click on malicious links, simulated attacks should cover other social engineering scenarios, such as requesting users to divulge user credentials to the ‘helpdesk’. In addition, organisations should go beyond using emails in their simulations, for example by employing impersonation phone calls to employees etc.
803. Reward good performance – As previously mentioned, in the wake of simulated phishing attacks, SingHealth staff who responded to phishing emails twice or more, are also given additional attention. They are requested to attend IT security briefings to become more aware of the risks and in the recent exercise in February 2018, such staff also received a formal letter, with a copy to their direct report, signed off by both SingHealth GCIO Benedict and Dy GCEO Prof. Kenneth, to strongly remind them of the need for vigilance. Aside from the use of brickbats, staff who perform well in the training and simulation exercises should be recognised and rewarded. Incentives help encourage behavioural changes, and some companies have turned to using gamification to make security awareness education more compelling e.g. points and prizes maybe awarded to employees who flag a phishing message.



Download 5.91 Mb.

Share with your friends:
1   ...   222   223   224   225   226   227   228   229   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page