Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Define, Reinforce and Track: Helping Develop Positive Cybersecurity Habits
  • Data Breach

Define, Reinforce and Track: Helping Develop Positive Cybersecurity Habits

5 years ago Chris Hudson
Define, Reinforce and Track: Helping Develop Positive Cybersecurity Habits

Getting teams to improve security can be hard work, but it’s an important job that organisations must take seriously to protect an increasingly risky world. For this post, I wanted to explore some ways that an organisation or individual might start building a new security “habit” so that, in time, acting securely becomes automatic.

Define it

The first key step is defining what you want your habit to be. Translating a security process or activity into a habit means there’s probably plenty of things you might want to become a habit. Defining the habit correctly can make all the difference. And whilst this might seem like common sense, how you put together your definition can be very important starting place for ensuring the habit will stick.

Useful things to consider at this stage include making the definition simple and easy to understand, but detailed enough that it’s clear how you measure success/failure- think “Review Unexpected Changes on Windows Servers every morning” rather than “Check File Integrity Monitoring”. I generally find a little bit of wiggle room in the definition works well, as it allows (especially during the early stages of habit formation) a bit of tolerance so you don’t get put-off carrying out the task.

Cue it up

Consider if it’s possible to set up cues that encourage the habit. A scheduled reminder or email can put a requirement in front of you (or the person in which the habit should be formed), although care should be taken to make this engaging, rather than an annoyance. When planning your habit trigger for those already complaining of busy email inboxes, a daily mail may be more frustrating than encouraging, whilst for others a task item might not provide sufficient visibility if they don’t already manage things through a task based to-do list (on a daily basis) – an element of flexibility and experimentation can make all the difference between a habit sticking or slipping.

As a fan of “inbox zero”, I find the email cue very effective – but I’d often spice it up daily messages with “quote of the day” signatures or a link to a daily crossword so I know that if I complete my task there’s a reward to come!

Reinforce it

Reinforcement of the habit is also very important. As before, different people may find different methods of reinforcement effective, so for some it might be best to associate successfully completing the activity with a reward such as ticking it off on a tracker, whilst for others some external reinforcement can be helpful (e.g. sending an email to someone confirming it’s done) or even a team scoreboard tracking success publicly and visibly.

Whilst you are considering this you may also want to think about what other methods you might want to use if you find the reinforcement effect to be “weak” or ineffective over time. There’s evidence supporting that making habit rewarding can be a powerful way to enforce the behaviour, even if the reward is only slightly related to the actual habit itself, so don’t be afraid to abstract out the rewards and cues – I personally find just getting a cup of coffee a very pervasive reward for my own “good behaviour”!

Equally, taking into account that using a variety ofsystems for reinforcement/reward may work better.  It may also be useful to identify a variety of methods such that you can inject some novelty into the routine, further helping with motivation and engagement – sometimes a weekly “success” review can help further.  If you’re trying to set the habit for others, consider what you might need to do to keep interest levels high, and not just the same thing every single day.

If we consider our Daily Change Audit review again, I might make the job more fun by tracking my progress and daily highs, but I would also likely try and vary the workload I’m addressing, so I’m not always looking at the same set of behaviours every day. Whilst this can help with detecting sudden changes, human beings tend to quickly “switch off” if there’s no variety, so doing the same job in exactly the same way can be ineffective. When building out a FIM solution, I’ll often structure Change Process Compliance Reviews to allow for different workloads for each day, such as investigating different device types or different types of non-compliance (outside of change windows, mis-use of privileged accounts, etc.), and spread these across a team so no-one gets bored and disengaged from the habit.

Track it

Keeping an eye on the habit to ensure you’re on track is useful for two reasons – it can act as a further rewarding reinforcement mechanism (encouraging you to try and “complete the chain” – Jerry Seinfeld’s infamous method of ensuring he kept on track every day: https://www.entrepreneur.com/article/334597), as well as a method of checking if you need to make any adjustments to your routine to make sure you’re aren’t lapsing. Ideally, your security controls should be helping you keep track and measuring successful application of security – although you might need to adjust your dashboard metrics to support some specific habit forming activities.

Make it easy to get back on track

During the early stages of habit formation, you should accept that you might fail, so there should be “guard-rails” in place to make sure this doesn’t have a negative impact (either to the security of the system or to the return to the formation process of the habit itself).  By planning for this eventuality, you can save a lot of headaches.

Patience here is key – do not expect habits to form quickly and easily and understand that you might need to try different approaches to the habit forming techniques – sticking to the same approach might in fact cause burn out and loss of interest in continuing with the habit. For our daily FIM checks, for instance, that might mean making sure that if you miss a day, you have ways to easily adjust the reports/dashboards you use to look a bit further back and catch up.  By using features in your tooling to make it easy to get back on top of reviewing the changes, you can ensure that the backlog never feels insurmountable

Habits to power up your cybersecurity world

Habit-building is a field that is often explored by psychologists, productivity gurus, and business analysts alike, with many having interesting insights and different approaches to help build up habitual behaviour. Whilst the above might not work for every security process you may introduce, perhaps it might help you to start thinking about building habits, and not just security procedures to ensure a more secure future for your organisation.

The post ” Define, Reinforce and Track: Helping Develop Positive Cybersecurity Habits” appeared first on TripWire

Source:TripWire – Chris Hudson

Tags: Cloud, High Severity, TripWire

Continue Reading

Previous Flubot Spyware Spreading Through Android Devices
Next FBI, CISA Uncover Tactics Employed by Russian Intelligence Hackers

More Stories

  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

13 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

15 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

16 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

20 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

21 hours ago [email protected] (The Hacker News)

Recent Posts

  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT