How has your team’s information security messaging changes during your response to the pandemic?

"Giving skills that were applicable to people's families probably had more interest than our own internal direction and practices"

Ahead of teissR3 | Resilience, Response and Recovery Online Summit 2020, Nick Harris, Global Head of Information Security at Oxford University Press talks to Sooraj Shah about communication strategies his organisation adopted during the COVID-19 pandemic to share cyber security messages.

teissR3, taking place 15th - 24th September 2020, is the leading event focusing on how you improve your organisation’s cyber resiliency and adopt best-practice in incident response and crisis management in a post-COVID-19 world. Register your place by clicking here.

Video transcript

In terms of your team and how they've progressed or how they've learned new things in this time, how what kind of reaction have you seen from them?

So we take as much as we can a data driven approach. And for example, simply monitoring Yammer posts, that the numbers of views, monitoring the number of views we get on our newsletter, all those things give us some sort of feedback, as well as the engagement we get on a daily basis.

And we found that the engagement has peaked very, very quickly. Interestingly, trying to give skills that are equally applicable to people's families probably had more interest than simply our own internal sort of direction and practises.

So just before half term, we reinforced some particular sort of cyber basic skills around gaming and the fact that some NCSC-- there was some NCSC games that were being pushed out or free to access. And our staff's children, if not our staff, could do these things at home. And actually that generated a lot of conversation, which is really good.

It was those sort of messages are shared frequently. And it not only reinforces the fact that the team exists and we're here and what our purpose is, but with that, we can reinforce our message. And we've found that's been really effective. And we will continue to tweak our message and reach different audiences depending on the metrics and stuff that we can measure.

And continue to spread the word. But I think if anything we probably as a team got more exposure to our staff and as a subject matter. I would probably be as bold to say that they know more now than they did when we were in the office because we've had to up our game so much.

Copyright Lyonsdown Limited 2021

Top Articles

With cyber attacks on the rise, the Royal Family seeks a cyber security expert

The Royal Household is looking for a cyber security engineer to monitor networks and protect digital systems from hacking attacks.

Colonial Pipeline paid $5 million in ransom to DarkSide ransomware group

Colonial Pipeline paid $5 million to the DarkSide ransomware group to restore operations within hours after a ransomware attack paralysed fuel supplies in the U.S. east coast.

HSE forced to shut down computer systems due to 'significant cyber attack'

Ireland's public healthcare system, HSE, has been forced to shut down its computer systems as hospital administrators became aware of a 'significant ransomware attack' on Thursday evening.

Related Articles