Blog

Digital literacy: why knowledge gaps are a growing cybersecurity concern

BY eSentire

October 18, 2017 | 5 MINS READ

Cybersecurity Strategy

Want to learn more on how to achieve Cyber Resilience?

TALK TO AN EXPERT

Digital literacy is an important term to understand for those who interact with the digital environment – aka, everyone. In this blog, we discuss digital literacy at a high-level, but will get into more specifics in this ongoing digital literacy series. Stay tuned!


What exactly is “digital literacy”?

Digital literacy is a trendy term in the technology sector. According to Wikipedia, it is “the set of competencies required for full participation in a knowledge society. It includes knowledge, skills, and behaviors involving the effective use of digital devices…for purposes of communication, expression, collaboration and advocacy.”[1]

More simply put, it’s the ability of an individual to engage with the digital environment. In terms of infosec, you can take it further to mean the ability to operate technologies safely – knowing what to do and what not to do and how to avoid taking unnecessary risks.

If you compare it to driving a car, we know that operating a vehicle requires a certain amount of practice and knowledge. It also requires you to pay attention to all that’s going on around you. The same is true with cybersecurity – in order to participate in a digital environment, you need to understand the rules. This is what makes you digitally literate.

Why is digital literacy important?

Digital literacy is an unavoidable part of everyday life that people tend to overlook. Almost our entire lives are online (whether you like it or not) and that’s only going to increase. Everyday users who don’t really “care much” about cybersecurity are the easiest and quickest targets for fraud and for access into an organization they work for. Pursuing digital literacy not only benefits you, but it also protects your friends, family and workplace.

At a high-level, what are some of the biggest gaps in digital literacy (within cybersecurity)?

There are a number of areas where people understand less than they should about online safety. For now though, I’ll highlight 5. These areas matter for every individual, whether in personal or professional environments.

  1. Monitor your behaviour on social networks

    There is a lot of misunderstanding around what people should and should not do/post on social networks. Before putting something online, you should ask yourself: Does this need to be public? Is it worth the risk? Not only is what you share online available to friends and family, but it’s also available to cybercriminals.

    These cybercriminals—or hackers—present both physical and virtual threats. The bad guys can use your social networks to gather user behaviour habits, like where you live and when you’re home. They can also access personally-identifiable information like birthdays, which can be used to facilitate fraud and identity-theft.

    Additionally, it’s important to remember that the information you provide on social channels can be used by cybercriminals as a way for them to understand your social networks and consequently gain access to business targets with confidential data they can exploit.

  2. Keep your devices safe

    Anti-virus software is great, but consumers tend to be overly reliant on it. There are additional measures you should take—like how you configure the settings on your devices. Each operating system you use has security settings that are often disabled by default. A good first step would be to learn what these settings are and to use them to your advantage. Also – be sure your patching is automatically triggered on your devices and you’re always taking the time to complete software updates whenever they’re available.

    At work, consider how this plays a role with bring-your-own-device (BYOD) programs. Because so many of us bring personal devices to the workplace and connect them to business networks, ensuring those devices are protected and used wisely puts significant responsibility on you as the employee.

  3. Understand how best to use passwords

    Passwords need to be complex and hard to guess, but not so much so that you can never remember them. One thing I like to recommend is “passphrases.” To make these, simply come up with a phrase you can remember and then make a password from the first letter of each word in the phrase. For example, if the phrase is “I love my red dog Pluto!”, the password would be “IlmrdP!”.

    Additionally, enable 2-factor-authentication whenever possible and don’t use the same password for all your accounts. You can use a password manager to help you keep track of all your passwords. I recommend an app called “keypass” – it’s free!

  4. Handle unsafe content

    It’s important everyone knows exactly how to respond or react in unsafe situations online. Here’s a few things to watch out for:

    1. Be wary of suspicious emails – if you think there’s some legitimacy to an otherwise suspicious email, get the phone number and follow up without giving any other information. Otherwise, just delete the email.
    2. Don’t fall for (or click on) popups claiming that your computer is infected.
    3. Avoid BitTorrent sites.


    Whatever you come across online, follow this simple rule: STOP and THINK. A few seconds of deliberation could save more than just your computer in the long-run.

  5. Safety considerations for the future

    When it comes to technology, the world is changing quicker than most people can keep up with. We’re entering an era in which more information is available than ever before, we’re increasingly reliant on technologies for even the most basic tasks, and technology is almost completely unavoidable. Although that may sound daunting, it doesn’t have to be.

    We need to be prepared. Our online presence has made us overly exposed—like being naked in a digital environment. The increasing interconnectedness between business and personal environments means we have to assume individual responsibility to make sure we’re using precautions on all our devices when online. It is not an impossible task, but it will require vigilance.

How can we start to bridge these gaps?

Education, education, education. Employers must take the time to train their employees on the importance of safe practices online. In our recent threat intelligence report from Q2 of 2017, we found that of 4 million cyberattacks, about 40,000 of them are phishing attacks. There are millions of stories online about people who have been hacked because of phishing – read these stories and learn from these mistakes!

The advance in technology is truly an exciting time. But like all progress, it will require some adjustments. If you’re an employer, consider how these knowledge gaps could compromise your business. If you’re an employee, take the time to educate yourself about online risks.


Learn more

eSentire® is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. For information about our services, please visit www.esentire.com.



eSentire
eSentire

eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit: www.esentire.com and follow @eSentire.

Read the Latest from eSentire