After a cybersecurity breach, second guessing can often turn into a blood sport. The business often blames Human Resources and the HR department is quick to say that they were not given enough information or blames IT. This kind of tension is far too common and nonproductive. Communication and creativity on all sides are essential to identifying and preventing cybersecurity threats. This article discusses some simple proactive steps that you can take now to help you recognize potential issues before it’s too late.

IT Hiring

Your IT department is both your first line of defense and greatest vulnerability. Do you really know who is working there? We will cover hiring in general and its role in preventing cybersecurity attacks in another blog, but often problems come because of bad hiring choices in the IT department. Because there is a shortage of qualified IT personnel and immediate needs must be met, warning signs are often overlooked. Both HR and IT must be trained to carefully analyze the credentials of all IT applicants. You need to look for gaps in employment history, too much job hopping and things that seem inconsistent such as career changes or abnormal job progression. Most importantly, you must do careful reference checks. Do not rely on the headhunter to provide references or do reference checks. They have a conflict and will not be as careful as you would like. References can easily be faked. For example, don’t accept just cell phone numbers. They could be giving you their brother’s number. Ask employees to provide work numbers for all references and call the human resources department of each prior employer to get dates of employment. Although there are more and more restrictions on background and criminal checks, they can still be done if you follow the rules. Make sure you do them. Also, do a careful social media check to see what their online presence looks like. Key warning signs are signs of second jobs that conflict with your business, angry posts, alternate identities such as “stage names,” peculiar political affiliations and overactive Twitter or Instagram accounts. Make sure you know all of their email addresses.

Policies

Make sure that your policies are up to date and provide full access to all accounts and devices. Don’t give employees carte blanche to use multiple devices. This only increases the risk. If you require employees to use a cell phone, you may want to consider providing the phone and make sure it is only used for business. The expense will pale in comparison to the cost and fallout from a major breach. Also, it needs to be made clear that you have the right to monitor and screen all content. You also need to make sure that all of your remote use policies are up to date and consistent with your other policies. If you haven’t updated your policy within the last year, you need to do so.

Put Up Roadblocks

Make sure that you have proper screening devices in place to monitor employee activity. There are systems that can be installed which can determine when employees access or download documents that they normally don’t and alert the company. You should also do spot checking to see if employees are emailing documents to their personal email addresses. This is a key warning sign. No matter how many safeguards you have in place, they do no good unless someone is actually responsible for monitoring them and alerting HR. Often steps can be as simple as making sure that employee access is appropriate for the employee’s job, and is monitored and updated if employees move into different roles.

Training

All employees need effective cybersecurity training. First they need to understand the do’s and don’ts. Second, they need to know what to look for. Third, all employees and especially supervisors need to understand their obligation to report any unusual activity or behavior and feel comfortable doing so. Supervisors need to be especially vigilant about changes in employee behavior and personal problems or issues. Troubled employees are at far greater risk of making mistakes or engaging in malicious or damaging activity.

Communication

IT, HR and your legal department or outside counsel need to be partners in combating cybersecurity threats. This can happen only if they communicate and work closely together. They need to be jointly responsible for creating and instituting training programs and briefing leadership on security issues and potential risks on a regular basis. This can’t be a one-time initiative — it needs to be a regular and routine part of your cybersecurity program.