There is no work-life balance in cybersecurity — part III

3 steps to engage employees in cyber hygiene

Bruno Triani
Nov 11, 2019 · 3 min read

I have written about my journey to understand how we deal with cybersecurity. First, I raised attention to the actions we perform online and how blurry the boundaries of digital trust can be. Next, I tried to figure out how to define responsibilities for information security. Now, the last part of this series captures my experiences in engaging employees in cybersecurity.

Part I — Where are the boundaries of trust?

Part II — From board meetings to daily tasks, who owns cybersecurity risk for the company?

(Photo by Andrew Martin on Pixabay)

1 — We are driven by convenience (cut to the chase)

2 — Making it personal (and inter-personal)

3 — Rewards and tracking (support and feedback)


To make security information accessible for everyone, we at Badrap are working to make the “weakest link” in information security stronger — individuals. We developed a free platform that connects the findings of security researchers to help people check if their credentials or devices are exposed online. Sign up for free at badrap.io

After having seen the positive impact of interactive training, personal approach, and rewards & tracking in raising cybersecurity awareness we are also now helping companies with the Cyber Hygiene Campaign. We offer an online awareness campaign that helps protect your business and connects your employees with our platform. You can try it out at hygiene.badrap.io

badrap.io

Badrap

Bruno Triani

Written by

Lost in translation between technology and people.

badrap.io

badrap.io

Badrap

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade