1. They help their business stakeholders understand the situation
Today, the emphasis on employee productivity is essential, but so is addressing the risk that new tech and working patterns introduce. What do business stakeholders need to know right now?
Many traditional security tools rely on employees being connected to the corporate network. Increasingly, employees are working off-network – so security misses a lot of visibility into how data moves. Tools that deliver endpoint visibility via an agent or without requiring data to flow through a VPN are suddenly in-demand.
Also, when people are working from home, they tend to feel more comfortable and work as if they were using personal devices. Basic security hygiene should not lapse when employees work outside the office.
Exfiltration or misuse of corporate data doesn’t have to be malicious. In fact, it isn’t in most cases. Simple mistakes happen. And people use tools that help them get their jobs done efficiently. In fact, more than a third (37%) of employees told Code42 recently that they use unsanctioned apps every day to share data with their colleagues. It isn’t that security teams don’t trust employees or want to police the organization. Instead, they want to understand where vulnerabilities are so they can adapt existing protocols and ensure the right tools are in place to enable employee productivity.
Security teams know that collaboration tools aren’t going anywhere and that they’re essential for the modern workforce, so security is adapting and needs the help of business partners.
2. They get business stakeholders to understand the implications and urgency of data loss — by being transparent and realistic, but not sensational
Ok, we know the response you’ll get to the last bullet above is “You need my help? Take a number.” Up the priority by highlighting what data loss means for them (but don’t be over the top).
Frame the situation in a useful way for your audience:
- Head of engineering? Talk about the possibility of losing source code, sabotage, or negligent sharing. Losing the confidentiality of that data means you won’t be first to market with your solution.
- Head of legal? It’s not all about compliance. What security is trying to do is get ahead of the inevitable investigation and protect data from loss or misuse early, so that costly litigation is less necessary.
- Head of HR? Look, security’s not the morality police, and this new world isn’t changing that. So, be clear that security wants to follow the data, not the people. Make a plan early to get HR the data security info they need to protect the integrity of your company’s culture without requiring that security teams invasively surveil users, or that HR teams become experts using complicated security tools to pair data activity to users.
- Quick win: here’s an eBook you can send your HR leader on the security costs of employee turnover.
3. They make a plan early to address data security at scale during periods of change.
Employees are still going to resign. People are going to act carelessly with data. Organizations are going to restructure. Get your stakeholders involved in making a plan and be sure not to let the intimidation of a big program get in the way.
- Start with quick wins, not a full-blown program. Plan for data security and visibility into where data lives and moves during off-boarding; ask about and see the riskiest behaviors with shadow IT and mirror technology, and prepare for endpoint visibility in remote work.
- Look for context — ask your line of business partners what’s normal and strange. Without context, tracking data is all just file events. Is it normal for your sales reps to use file-sharing tools their clients dictate? Which ones? Which marketing folks should or should not have Salesforce reports on their computers?
- Code42 helps organizations address data security using tools like ours to improve the speed and accuracy of insider threat detection, investigation and response. Code42 Incydr™ delivers the risk signal needed to distinguish between everyday collaboration and the events that actually put company data at risk.
4. Be transparent with your line of business leaders. It encourages better behavior.
- You don’t have to share the details or the keys to the kingdom, but remind people of acceptable use protocols and let them know that you’re monitoring data use.
- The response to insider threats to data isn’t the same as a traditional IR or SOC response. And in most cases of mishandling data, the response won’t require punitive action. While you’ll certainly want to be prepared for how you and your business partners will handle malicious theft of data, the most common response will be some education and security awareness – not only with employees, but with business leaders to help them understand the inadvertent risk a company can incur when teams misuse or exfiltrate data.
- It’s easier to be transparent when you’re monitoring data use instead of employees themselves.
Organizations are rapidly responding to their environments and pushing for digital-first strategies. It’s time to embrace the collaboration culture by empowering security organizations to create a strategy that enables that culture.