It’s not because of ill will that your colleagues do not comply with your IT security procedures. It’s not to give the IT department extra work that employees click on links in phishing e-mails or download programs from obscure websites.

For many of your colleagues, the inappropriate behaviour arises because they do not understand the correlations of your IT system. For many non-technical employees, IT is a big, grey cloud that “some other people take care of”.

A security presentation is not enough

Being responsible for IT, it’s your responsibility that all your colleagues understand how and why they should help to protect your organisation’s information security.

In many organisations, this responsibility is carried out by the IT Manager in front of the employees with 54 PowerPoint slides filled with points, statistics and abbreviations, which in fact only data scientists can understand.

Believe it or not, this method is not particularly effective.

Explain IT security in layman’s terms

When you need to explain information and data security, the same principles apply as when a researcher has to explain his work at a family dinner.

It’s about three things:

  1. Making the subject relevant to the recipient,
  2. Deciding on the main message,
  3. Forming memorable images for the receiver.

These three things are essential for your message to get through all the noise.

#1 Why do you want to learn about IT security?

When you need to explain IT security concerns to your colleagues, the first step is to ask why IT security is important to them. It’s not enough to ask the question to yourself. You must actually ask the employees.

Take a handful of employees aside and ask them why IT security is important in their work. Remember to ask colleagues from various functions and departments.

Once you have talked to your employees outside the IT department, you will know which stories and examples to bring up when presenting security procedures to the rest of your organisation.

#2 Decide on a key message

There is always a prioritisation of risks. You know what threats are greatest and what traps your colleagues most often fall into.

Therefore, you also know which security measures are most important for your colleagues to remember. Is the most crucial thing to lock your computer when you leave it, or is it to delete e-mails from unknown senders?

When you need to communicate security measures to employees, you must have this prioritisation in mind. Ask yourself: “If people only remember one thing, what should it be?”

Once you have answered that question yourself, focus all your communication on that goal. Explain it over and over and over again. And in new ways, over and over again.

If you can get employees to remember just one message, you will find that they do not just remember it — their increased attention to IT security will have a “spillover effect” into other areas of security.

#3 Form mental images

It’s not only IT security that is difficult for non-technical employees to understand. As a rule, there is a general lack of understanding about IT. It also means that the starting point for what IT concepts your colleagues understand is much lower than you expect.

As with all other complex topics, it can therefore be useful to explain yourself via metaphors, i.e. imagery. Transform the complex and intangible knowledge into concrete things. Metaphors are extremely useful when you have to explain something abstract, meaning something that you cannot directly sense (in Danish).

When you talk about IT security, try to explain it as if it’s a house’s anti-theft protection:

  • Lock your front door when you leave your house = lock your computer when you leave it
  • Do not buy from unfamiliar door-to-door salespersons = do not click on links from people you do not know
  • When the locks of the house are rusty and do not work, you change them right away = update your software to close security holes
  • You are vaccinated before you travel = update your antivirus program before you go online.

By using images and situations that your colleagues can easily relate to, it’s much easier for them to understand why IT security is vital. So, the next time you need to introduce employees to a new security procedure or security measure, keep in mind that it’s only IT professionals who understand your technical language. Ask your colleagues why IT security is relevant to them, decide on a main point, and transform the technical language to images that employees can recognise.


Download the free Whitepaper

 

"From operations to strategy"

 

You’re very likely facing this every day—a requirement for increased automation throughout the organization in order to raise competitiveness and also increase user satisfaction. That’s a difficult balancing act, and only few people succeed.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download the free Whitepaper regarding Digital Employee Analytics

 

"Employees are (also) the real success factor in the digital era"

 

In today’s digital world, employees build their careers on the ever-changing opportunities presented to them. So, competitiveness requires more from companies than ever before — you need to present your corporation as attractive as possible to existing as well as future employees.

Therefore, you need to incorporate the Employee Experience, which includes all aspects of the relation between the employee and the employer.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download the free Whitepaper

 

"How to select the right software provider"

 

Software providers abound, and very likely they will call you again and again wanting to present their solutions.

CapaSystems has made a brief guide with concrete advice on what you need to be aware of when you contemplate switching software providers or wish to integrate a new system in your organization.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download a free Whitepaper regarding the CIOs role in the future

 

"CIO as business developer"

 

It is crucial that businesses’ CIOs are able to identify, select and evaluate the IT services that provide maximum insight and increase growth and productivity. That requires tools that provide up-to-date operational insight into services’ functionality and stability.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

User Experience

Download free whitepaper regarding performance issues and end user simulation

 

"Solve your performance issues with end user simulation"

 

A recent study showed that Danish employees waste an average of 144 hours a year on slow computers. To a company of 500 employees, that is hundreds of thousands of Danish kroner. This whitepaper describes how you can minimise waiting time by having your IT provider comply with your service agreements.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free Whitepaper from CapaSystems regarding performance issues and how to awoid wasting time

 

"Analyze infrastructure and use time efficiently"

 

Performance problems and long login times can easily cost businesses and organizations time that corresponds to several full-time jobs every year. It can be hard to identify the roots of the problems with traditional solutions.

End-user performance monitoring, however, provides an overview that covers the entire infra-structure – from end users to network and server applications. That provides an accurate, factual basis for correcting current problems and for nipping future problems in the bud.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free whitepaper regarding BYOD

 

"Bring Your Own Device?"

 

Mix of personal and business applications on same IT devices makes IT departments worry.

But what about the security of your company in this universe of personal and business apps provided by a Bring Your Own Device (BYOD) culture?

 

 

 

Download the white paper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free whitepaper regardingShadow IT

 

"Cast new light on Shadow-IT"

 

It’s a challenge when employees and business units purchase technology and IT services without involving the IT department. You easily lose perspective of finances, agreements and where important information is located –and if you’re not able to name who’s responsible for support from day one, a service outage risks being interpreted as internal trouble, even though the IT department has nothing to do with it.

 

 

Download the Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free whitepaper regarding security

 

"3 steps to secure the company against data sheft"

 

It is said that a chain is only as strong as its weakest link. Therefore, your weakest link in the IT systems will have to be properly secured. Here are our suggestions for three things that can secure your IT infrastructure.

 

 

Download the Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.