The cybersecurity rebellion:
The end-users strike back

We are a group of five students in Carnegie Mellon University's Master of Human-Computer Interaction (MHCI) program. Our collaborative project with Cisco aims to design solutions for the future enterprise and enhance its workforce. Here is an overview of our intensive four-month research sprint that delved into the realm of enterprise security, exploring the various job functions within it.
Context

Understanding cybersecurity

What is cybersecurity?
Cyber security refers to a set of measures and practices aimed at safeguarding networks, systems, organizations, and individuals from malicious digital attacks.
Why is it important?
  • It helps to protect our sensitive information from falling into the wrong hands.
  • It is critical for protecting our devices and networks from cyber attacks.
  • It is essential for protecting critical infrastructure and public safety.
  • It is also important for national security.
Type of threats

Malware: Type of malicious software that is designed to damage, or gain unauthorized access to a network.

Phishing: Common form of social engineering that involve tricking users into revealing sensitive information.

Distributed Denial of Service (DDoS) Attacks: Attacks involve overwhelming a server or network with traffic in order to render it unusable.

Zero-Day Exploits: Type of malicious software that is designed to damage, disrupt, or gain unauthorized access to a computer system or network.

Supply Chain Attacks: attacks involve compromising a vendor or supplier in order to gain access to an enterprise's systems or data.

Client

Who is Cisco?

Founded in 1984, Cisco is widely recognized as a leading provider of enterprise networking solutions, with over 80,000 employees in 95 countries around the world.

After four decades, Cisco's attention has shifted towards securing multiple endpoints and cloud computing. The company's objective is to simplify its security offerings by developing the Cisco Security Cloud, which plans to be the industry’s most open platform, “protecting the integrity of the entire IT ecosystem”. At present, the company's emphasis is on three primary areas:

check_circle
Network Security
check_circle
User & Devices Security
check_circle
Cloud and Application Security

What are Cisco's goals?

In a post COVID world, requirements of cybersecurity have changed as businesses began to adopt a digital-first model. Cisco plans to help customers connect, secure and automate to accelerate their digital agility in a cloud-first world. Client priorities Cisco may help with:

Reimagine applications

Power hybrid work

Transform infrastructure

Secure enterprise

Problem Statment

The security landscape is drastically changing how security, network, and IT professionals protect organizations. How might Cisco tools empower workers and innovate in this changing landscape?

A possible approach Cisco has considered is to create a unified security platform that can seamlessly integrate multiple security products, offering users a more comprehensive and better streamlined security experience. By consolidating its security portfolio and simplifying its offerings, Cisco hopes to become a security product leader for organizations of all sizes to implement effective cybersecurity measures and safeguard their critical assets.

Findings

Insights we gathered

Moreover, Cisco recognizes that the current security landscape is highly dynamic and fast-paced, and it is crucial to keep pace with the evolving threat landscape.

Enterprises find it difficult to update older tools and systems, which in turn means lesser protection against newer threats.
add

The simple answer to the legacy problem is to replace the old system. However, three main factors hold enterprises from doing so-

  • Cost - Replacing or upgrading legacy systems can be expensive, especially for large enterprises that have many different systems in place.
  • Downtimes - Retiring a legacy application can cause disruption of work in an organization. During the transition to a new system, employees may need to stop using the old application, which leads to disruptions in business processes and productivity.
  • Compatibility - Legacy systems may be incompatible with newer technology or software, making it difficult or impossible to upgrade them without significant changes to the entire IT infrastructure.

“Legacy systems can’t be shutdown or updated easily... It takes years of effort to sunset them.”
-  Excerpt from an interview with an information security lead

Clients are discouraged by the training time & expense required to adopt new tools.
add

The challenges of adopting newer security tools are two fold-

  • Training existing employees - Spending time on tedious tasks such as going through documentation and waiting for customer support to resolve technical issues can be a significant drain on a company's engineering resources. These valuable hours could be better utilized for productive activities that can help the company grow and innovate.
  • Hiring new talent - The demand for cybersecurity experts is high, but the supply of qualified candidates falls short. Enterprises want experienced professionals, leaving entry-level job seekers struggling to gain experience and causing a skills gap.

“Affordable doesn't mean how much the system cost, but how much does it cost for my staff to learn it and run it.”
- Excerpt from an interview with a CTO of a startup

Security professionals struggle to convey the monetary value of securing a vulnerability to the management leadership.
add

Convincing decision-makers to invest in preventative measures can be challenging as it may seem like an unnecessary expense. While the consequences of a security breach can be catastrophic for a company, such as loss of sensitive data or financial losses, it can be difficult to quantify the value of investing in security measures. Decision-makers may also be hesitant to invest in preventative measures as the return on investment is not immediately visible.

“Translating security risks into monetary value is a difficult task. The return of investment for securing an enterprise is hard to measure and convey.”
-  Excerpt from an interview with a CISO of a University

Reframing

Through our research, we discovered that the cybersecurity industry strongly prioritizes building tools to defend enterprises. However, we found that it’s often the end users who are pivotal.

Convincing decision-makers to invest in preventative measures can be challenging as it may seem like an unnecessary expense. While the consequences of a security breach can be catastrophic for a company, such as loss of sensitive data or financial losses, it can be difficult to quantify the value of investing in security measures.

Original Problem Statement
How might Cisco tools empower workers and innovate in the fast-changing landscape of cybersecurity?
Original Intended Approach
“ We want a unified security platform that serves the specific needs of each role.”
New proposed approach
We need better ways to equip, incentivize, and empower employees so they can become strong defenders of their organization’s cybersecurity.

The reframed approach puts a stronger emphasis towards Cisco’s goal of emerging as a competitor for the cybersecurity space by focusing on clients’ pain points and putting their needs at the forefront. The reframe also acknowledges the constantly changing landscape of cybersecurity and the fact that traditional security measures may not be enough to address emerging threats.

Empower

Incentivize employees with internal and external motivations to practice security hygiene.

Equip

Equip employees with the necessary resources to improve their security hygiene.

Incentivize

Incentivize employees with internal and external motivations to practice security hygiene.

End-Users

Why focus on employees?

Humans are often referred to as the “weakest link” in cybersecurity because they are susceptible to making mistakes and errors that can compromise the security of an organization's digital assets.
Ultimately, it is the actions and decisions of individual employees that can make or break an organization's cybersecurity posture. Understanding the behavioral archetypes of employees regarding cybersecurity awareness and cyber hygiene can help organizations tailor their training and awareness programs to better meet the needs of their workforce.

The Employee Archetype Quadrant

The Employee Behavior Quadrant is a theoretical model that aims to classify various employee behaviors and attitudes towards cybersecurity. This model comprises two axes:

Involvement

Involvement axis describes the level of interest, participation, and commitment an employee shows towards cybersecurity practices. Involvement axis can further be divided into two categories:

check_circle
Active involvement, which indicates a high level of interest towards cybersecurity practices.
check_circle
Passive involvement, which implies a low level of interest towards cybersecurity practices.
Knowledge

Knowledge axis refers to the employee's awareness, understanding, and expertise in implementing cybersecurity measures.The knowledge axis can be classified into two categories:

check_circle
High knowledge indicates that the employee has a comprehensive understanding of cybersecurity best practices and can implement them effectively.
check_circle
Low knowledge implies that the employee has limited or insufficient knowledge of cybersecurity practices.

The employee archetypes

The Human Firewall
add

Employees in this quadrant are highly engaged and committed to following cybersecurity policies, and possess a good understanding of cybersecurity best practices. They are likely to be proactive in identifying and reporting potential security threats.

The Shortcut Savant
add

Employees in this quadrant have a good understanding of cybersecurity best practices, but are not actively engaged or committed to implementing them. They may need to be motivated or incentivized to become more involved in cybersecurity practices.

The Bystander
add

Employees in this quadrant are neither actively engaged nor possess a comprehensive understanding of cybersecurity best practices. They may require significant training and support to become more involved in cybersecurity practices. This quadrant represents the highest risk to an organization's cybersecurity posture.

The Model Citizen
add

Employees in this quadrant are highly engaged and committed to following cybersecurity policies, but without fully understanding the reasons behind these policies. They may require additional training and guidance to implement effective cybersecurity measures.

What is everyone doing to help employees?

Social Engineering Simulation Training

The emergence of social engineering attacks has prompted the creation of vendors that focus on developing software programs to help businesses and organizations defend against these types of attacks. These programs aim to simulate real-world phishing attacks and provide employees with a safe way to practice identifying and responding to these types of attacks.

check_circle
KnowBe4
check_circle
Cofense (PhishMe)
Reducing Reliance on Human Judgements

Technical advancements like 2FA and zero-trust security models are becoming more prevalent in organizations' cybersecurity strategies. These tools can help protect against a range of attacks, from password cracking to insider threats. However, these approaches might give the wrong impression that humans can be entirely out of the picture of cybersecurity posture.

Monitoring and Metrics Tracking in Employee Behavior

Organizations are increasingly using monitoring and metrics to track employee behaviors and violations of cybersecurity policies. This can include metrics like click-through rates on phishing emails or the number of security incidents reported by employees. However, while these metrics can be useful in identifying areas for improvement, they don’t necessarily provide insights into the context, goals and motivations behind employee’s behavior.

Employees are not the problem

Most of the solutions available in the market take a condescending approach towards employees and portray them as risks. This approach is ineffective as we rarely address the underlying issues and causes of security breaches. Instead, businesses need to empathize with employees and design cybersecurity solutions around their needs, goals, and social settings.

Taken from the landing page of a popular security awareness training solution, we can sense the negative tone against employees and end users. While employees are indeed more susceptible to making mistakes and errors, it isn’t reasonable to assume all employees would keep security at the top of their minds, if they don’t work in a cybersecurity team.

Vacuums and Opportunities

Workflow Integration

What leads to breaches in protocol? Three common recorded responses- “to better accomplish tasks for my job,” “to get something I needed,” and “to help others get their work done”. These three responses accounted for 85% of the cases in which employees knowingly broke the rules,” research records. Why does security stand as a deterrent which hinders an employee from their usual day-to-day workflow, causing them to override the rules?

Accounting for Stress

People are substantially more likely to knowingly break security protocols on days when they reported experiencing more stress, suggesting that being more stressed out reduced their tolerance for following rules that got in the way of doing their jobs. What considerations should design of security make for workplace stress that induces employee complacency?

Job Design and Security

The connection between job design and cybersecurity is significant. Adhering to cybersecurity regulations can increase employee workload, so compliance should be rewarded like other performance metrics. This raises the question of what employees gain from paying attention to security policies, as it is not currently considered part of their job.

Provisioning for Altruism

18% of policy violations occur because employees want to assist their colleagues, such as in BEC scams. This can lead to breaking protocol and making transfers without proper verification due to time pressure. The current security design does not support employees helping each other without compromising enterprise security. Ideally, employees should not have to choose between helping colleagues and breaking security rules.

Overreliance on Technology to stop Human Error

Encryption and authentication are only effective if they are consistently used, but employees often override them for various reasons. The design of security tools often fails to address this issue. How can design be utilized to bridge this gap and promote consistent usage of security tools? Are barriers to entry and the challenges of maintaining consistent use of security tools adequately considered in the tool creation process? What role can design play in addressing these challenges?

Members

Subha Ramkumar

Jacob Chen

Ian Clark

Parvathy Anand

Daisy Dai