Workers tested on security smarts

Agency officials explore ways to make employee security training effective

8 security awareness tips from FTC

Here are eight ways the Federal Trade Commission raises security awareness among its employees.

  1. Holds an agencywide Privacy Week with seminars, activities and contests designed to increase awareness of privacy policies and requirements.

  2. Creates education campaigns about important topics, such as
    laptop PC security and data breach

  3. Sends weekly e-mail messages to remind employees of policies on privacy and data security.

  4. Has a privacy resources Web page on the agency’s intranet.

  5. Presents panels and presentations on privacy.

  6. Publishes monthly and quarterly newsletters on privacy-related

  7. Has specialized, role-based training for specific groups, such as student interns.

  8. Requires the chief privacy officer to attend the meetings of different organizations within the agency.

— Mary Mosquera

Agencies have implemented technology policies and procedures to safeguard data and system security. However, the toughest part is getting employees to follow them and change the way they handle data, security experts say.

Agencies require annual security awareness training, but it is difficult to determine how effective it is and whether employees protect data in their daily work, said Marc Groman, chief privacy officer at the Federal Trade Commission. A formal training program should include one or more computer-based training modules or live presentations that cover basic computer security concepts, he said.
Privacy and data-security education and training must be offered year-round, Groman said, adding that “it’s not a one time exercise, program or event.”

One way to measure progress is to track how many agency employees and contractors have completed such training, security officials said. For example, at the Justice Department some agencies block the network accounts of employees who have not taken security training classes by a certain date.

Required training should be the start, not the end, of an effective employee-training program, Groman said. “There must be other creative, ongoing initiatives to keep privacy and data security in the minds of your staff on a daily basis,” he said. FTC keeps data security and privacy on the front burner by offering a number of programs throughout the year.

At Justice, officials annually revise the department’s security training topics, which are closely related to rules that employees must agree to follow when they use departmental systems. The topics evolve as awareness of specific problems grows. Last year, for example, the increased occurrence of data breaches led to expanded training related to safeguarding personal information.

Some agencies are trying different approaches to assess how well employees respond to suspicious situations. This year, Justice tested a program in which it sent a phishing e-mail message to a number of employees. Because the sender was unknown, employees were expected to be suspicious and not open the attachment. If an employee opened the attachment — activity that training should have taught employees not to do — the department notified the employee that opening the attachment was risky behavior and warned the employee not to do it.

“We can get feedback on how effective it is at changing that behavior over time,” said Dennis Heretick, Justice’s chief information security officer.

Justice officials say they hope to expand the phishing exercise, conduct periodic random sampling and keep statistics to determine if fewer people fall for phishing scams.

The Treasury Inspector General for Tax Administration recently conducted a similar hands-on exercise. TIGTA staff members, posing as computer help-desk representatives, called Internal Revenue Service employees, requested their user names and asked them to temporarily change their password to one the TIGTA staff members suggested. About 60 percent of those sampled did so.

In response to the TIGTA report, the IRS plans develop awareness programs for employees about social-engineering attempts by hackers, said Daniel Galik, associate chief information officer for cybersecurity at the IRS.

Agencies can monitor employees’ compliance in other ways, such as conducting internal audits of privacy controls, experts say. For example, an agency can make visual spot-checks in offices and common area file rooms to verify that office doors have working locks and that personal information is not in plain view on unoccupied desks.

About the Author

Mary Mosquera is a reporter for Federal Computer Week.


  • Contracting
    8 prototypes of the border walls as tweeted by CBP San Diego

    DHS contractors face protests – on the streets

    Tech companies are facing protests internally from workers and externally from activists about doing for government amid controversial policies like "zero tolerance" for illegal immigration.

  • Workforce
    By Mark Van Scyoc Royalty-free stock photo ID: 285175268

    At OPM, Weichert pushes direct hire, pay agent changes

    Margaret Weichert, now acting director of the Office of Personnel Management, is clearing agencies to make direct hires in IT, cyber and other tech fields and is changing pay for specialized occupations.

  • Cloud
    Shutterstock ID ID: 222190471 By wk1003mike

    IBM protests JEDI cloud deal

    As the deadline to submit bids on the Pentagon's $10 billion, 10-year warfighter cloud deal draws near, IBM announced a legal protest.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.