Social Engineering Blogs

An Aggregator for Blogs About Social Engineering and Related Fields

MAD Security Blog April 10, 2013

Security Awareness Content: Challenges of Using Punishment

Punishment is evident in all aspects of our life to everything from getting drivers to stop speeding, to getting the dog to not bark at the mailman. Because of this, it is no wonder that several go to punishment when wanting to change user behavior. While punishment is a very powerful tool- that can produce almost immediate change in behavior- it is very hard to control and very hard to maintain. For these reasons, I rarely recommend using punishment when creating and effective security awareness architecture.

sexWhat is the most effective punishment?

Want to know how to reduce user behavior with almost 100% effectiveness? Deprive users of food, water, and/or sex. Go forth and develop content.

…

No? I didn’t think so. When making security awareness content, we as info sec professionals are not able to use the most effective punishers and therefore have to evaluate our user base to figure out what is the next best thing. This punishment has to be easy to implement and applicable across your entire user base. Furthermore it has to be easy to maintain. Lets say you have an issue with users not properly disposing of PII so you decide to implement a termination policy for all instances of improperly handled or disposed of PII. While very effective (because it gets at the users ability to purchase food and water) it is not easy to maintain. You will either end up with a lot less employees REAL quick or you turn into the boy that cried wolf. Lets say that instead of termination, you force the employee to click through a 10-slide power point outlining what PII is and how to properly dispose of it. That won’t work either for the opposite reason- even though it’s easy to maintain, it’s effectiveness, as a punisher will wear off drastically. Think of this similarly to getting desensitized to a pop-up notification. It is for this reason choosing a contingency is often one of the hardest parts of using punishment in a content plan.

Indirectly punishing behaviors

Imagine that your organization has a major problem with users loosing mobile devices, laptops, and tablets. A loss is reported at least once every two weeks and each lost device exposes your organization to a data breech of some highly sensitive information (e.g., customer credit card information). In an effort to reduce this behavior, and keep your organization out of the news, you inflict a $100 penalty for loss of a phone, $300 for tablets, and $500 for a laptop. You see an immediate drop in device loss but after a few months some other patterns start to emerge. First, calls to report anything to the security team significantly reduce. This includes reports about phishing attacks and suspicious computer behavior. Second, when a device is lost, users are taking an average of 2 weeks to inform the security team. In the past, lost devices were reported within 24 hours. Both of these present a major problem to your organization and are the unfortunate side effect of a poorly used punishment. This example demonstrates how even though a punishment is inflicted upon a specific behavior it does not guarantee that the effect will be isolated. The plan was to reduce loss of devices, but users were also being deterred from reporting the loss as well as calling the security team at all.

While major, these two topics are just a few in a long list of reasons why using punishment to change user behavior is difficult to do. To be effective, a large amount of control is needed otherwise you can create more problems than you started with.

Filed Under: Behavior, Behavior Change, learning, Metrics, Motivation, Phishing, Security, Security Awareness, triggers

MAD Security Blog April 4, 2013

Security Awareness Content: Challenges of Using Reinforcement

Imagine that you are the head of security awareness at an organization (not a stretch for some) and have been charged with getting people to report issues to the help desk. You decide, in your infinite wisdom, to encourage them to report issues to the help desk by giving them $1 each time they report a valid problem. The week after implementing the new reward program the number of issues reported to the help desk has increased 100 fold. You program is getting great results. Not only are 99% of phishing attacks getting reported but shoulder surfing is down, you know when devices are lost, and compromised computers are being reported to the help desk rather than being discovered by them. Things are coming up roses.

See any problems here?money

Of course you do! The budget for this program is going to be INSANE! No practical business will support paying $1 for each ticket at the help desk for any longer than 6 months- MAX. This leads into the second, and biggest problem with using reinforcement. If the only reason that users are reporting issues is because of a reward, the minute that the reward is removed the desired behavior plummets. Unless you can replace the reward with something of equal subjective value their incentive is gone and the trained behavior is lost.

*Finding something of equal subjective value to cash on a large scale is damn near impossible. I only say ‘damn near’ because I’m sure there is some magical place out there that can do it but I’ve never come across it. *

Finally, lets say that instead of $1 you gave them a free lunch- because your users really like lunch. How long will that be an effective reward? My guess is that after about a month of free lunches have been accrued the value of the reward will go down dramatically and so will your behavior. Suddenly, you have to switch the reward to something else – of equal subjective value- to keep them responding.

Vicious cycle anyone?

How to Use Reinforcement to Your Advantage

As you can see, reinforcement is a tricky thing but when can we use it to change behavior.

Lets go back to the help desk problem. Instead of paying for each help desk ticket, indefinitely, you make it a charity fundraiser for the holiday.

“Every time you call the help desk, $1 will be donated to buy gifts for families in need. Weekly progress will be reported!”

Some of you might look at this and say “even if we had the budget for that, we still have the same problem of removing the reward and loosing the behavior once the fund raiser was over” but consider two very important differences.

1-    The reinforcement has a clearly defined ‘end point’ that has nothing to do with the user, the company, or their behavior but is a product of the reward. The gifts have to be bought at some point otherwise the fundraiser was pointless. Essentially you are isolating the reinforcement contingency and increasing your chances of the behavior persisting after.

-Not to mention periodic fundraisers to increase behavior –if needed- are MUCH more sustainable to the budget than constant reinforcement.

2-    The second and most important is how closely the reinforcement (e.g., $1) and behavior are paired. In our first example the employee saw the DIRECT effect of calling the help desk on their pay check therefore it was very closely paired to their behavior

Just like if Pavlov’s dogs were fed EVERY time the research assistant came in.

The minute that the user realized the reinforcement was removed, the behavior that followed stopped (i.e., calling the help desk).

Back to Pavloc: The dogs would eventually stop salivating once they knew that the assistants were never going to feed them.

In our second example, the users see the money increase but it is NOT directly related to each time they call the help desk. Instead it goes into an anonymous pool that may jump $100 a week even if they just called the help desk once. Since the reinforcement is not closely tied to each behavior they perform, the chances of the behavior persisting after the reinforcement is removed increases significantly.

*For a more detailed look at this process see my previous blog on Pavlov and his dogs.

Based on all of this, be careful when using reinforcement. While it may provide an immediate result, it’s something that needs budget and time to maintain. If used wrong, you will just be setting yourself up for an uphill battle.

Filed Under: Behavior, Behavior Change, culture, learning, Metrics, Motivation, Phishing, Security, Security Awareness

MAD Security Blog March 27, 2013

Security Awareness Content: The Viral Video

How did a Korean pop artist become THE most viewed video on YouTube, and become an instant sensation in a country that does not speak Korean?

psy-gangnam-style-danceThe power of viral videos.

The propensity for people to see a video, post it on their Facebook, Tweet it, email it to friends, and show it to everyone that passes by their computer has given people like Rebecca Black, Justin Bieber and dancing babies the ability to be famous!

You can reach millions of people in days if you can harness the power of the viral video. So why not use it within your organization? Would it work to reach users about USB drives or is this just reserved for teen pop and dancing babies?

Our security behavior design team at MAD security decided to test this question. We took the concept of the ‘funny cat video’, applied it to USB drives, and voila the buddy video was born. Soon we were going onsite to talk to potential clients and they would ask “hey, can I see the cat video?” People that we had not even engaged yet had heard about our viral USB video.

Maybe it was a fluke? Does this only work for cats?

We tested again, but this time we made the HR Lady video. We showed it to a few people at RSA and suddenly our sales team was flooded with emails like “We have to have that video!”, “How do I get that sort of content for my organization?” and “Do you have more?”

So there you have it, viral videos are NOT just for teen pop, dancing babies, and some crazy Korean guy dancing on an imaginary horse.

So how do we use them in our security awareness architecture?

Justin Beiber Visits Live At MuchMusic - Toronto, ON

Appealing to Your Audience

A viral video is a very unique medium. It is something that is short and usually funny.

Come on, Justin Bieber videos are funny….the first few times

It also speaks to a topic that appeals to many. So how do we harness this in our security awareness content? Find out what your users find funny. Once you have figured out your hitch make sure you and the creator(s) are not the ONLY people that find it funny. Going off the humor of some esoteric show only seen on hulu – that development team happens to love- will not get you the impact you are looking for. These types of videos need the eyes and input of many to know if it’s going to work. Ideally, you should be able to send this to 100 of your closest friends and co-workers- inside and OUTSIDE of InfoSec- and get at least a chuckle from everyone.

Make a Lasting Message

One of the major things to consider when making a viral video is ‘what is the shelf life of this joke?’ If the topic of the video is extremely specific, you run the risk of basing your video on a 2 month fad…and for all that know how long it take to make a video- that joke will be dead before the video is released. A good viral video appeals to many, but isn’t sooooo specific that it only appeals to them for 30 days.

See Jessica Black- Friday. She went viral and then dropped off the face of the earth…thank goodness.

Picking topics that may change over time but still remain funny are good. Appeal to an intrinsic humor, not just the latest fad.

SUPPLEMENTAL Not Foundational

Knowing the effect of viral videos is not ground breaking, but being able to apply it properly is. To this note, viral videos canNOT be used as foundational training videos. Think about it, if you made every one of your 20 training video some slant on cat memes how quickly would it take for that to get old to the users? My bet is pretty quick. Your users will quickly become desensitized to that type of humor and your training has suddenly become ignored. Furthermore, you can’t use the viral video for what it’s best at, REMINDING! Viral videos aren’t for presenting large amounts of information; they are for getting a message stuck in the viewers head!

-How many of you have Gangnum style, that Friday song, Bieber, or that dancing baby stuck in your head? I’d guess at least a few.

Viral videos, and concepts, are a powerful tool. Not applying them to your security awareness content plan is just as short sided as not using email as a medium to communicate with users.

Also, they are pretty fun to make!

 successKid-Viral

Filed Under: Security

  • « Previous Page
  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • 16
  • Next Page »

About

Welcome to an aggregator for blogs about social engineering and related fields. Feel free to take a look around, and make sure to visit the original sites.

If you would like to suggest a site or contact us, use the links below.

Contact

  • Contact
  • Suggest a Site
  • Remove a Site

© Copyright 2025 Social Engineering Blogs · All Rights Reserved ·