• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Question 3

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

How can employee risks be controlled?

Filed Under: 2b: Creating a Security Aware Organization Tagged With:

Reader Interactions

Comments

  1. Changyang Sui says

    June 10, 2025 at 11:34 pm

    1. Comprehensive Security Awareness Training
    Formats: Classroom sessions, e-learning courses, regular security reminders
    Key topics: Password security, phishing identification, malware prevention

    2. Enforcement of Security Policies
    Technical controls: Strong password requirements, auto-lock screens, least-privilege access
    Administrative measures: Clear violation consequences, reporting mechanisms

    3. Continuous Security Culture Reinforcement
    Daily reminders: Security posters, email alerts
    Regular testing: Phishing simulations, knowledge refreshers

    Log in to Reply
  2. Jialin Fan says

    June 15, 2025 at 3:48 am

    To control employee risks, the following measures could be taken:
    1. Implement technical controls: It could implement least privilege access and role-based access control; require multi-factor authentication; use device encryption, firewalls, and anti-malware tools to protect work devices; deploy user behavior analytics and SIEM to detect suspicious activity.
    2. Training and education: It’s necessary to provide regular training on company policies, laws and regulations, and ethical standards. This can enhance employees’ awareness of compliance and reduce the likelihood of violations.
    3. Employee communication: It’s important to maintain open communication channels with employees. Encourage employees to report potential problems or concerns in a timely manner, and ensure that their reports are properly handled.
    4. Internal control and supervision: It would set up an effective internal control system, including segregation of duties, authorization procedures, and internal audits. This can prevent fraud, embezzlement, and other unethical behaviors.

    Log in to Reply
  3. Xinran Wu says

    June 16, 2025 at 1:54 am

    Enterprises can improve the security awareness of employees by setting up training. The training topic may includes Physical Security, Desktop Security, Wireless Networks and Security, Password Security, Phishing, Hoaxes, Malware, Viruses, Worms, Trojans, Spyware and Adware, File Sharing and Copyright and so on. The training includes what to look out for, preventative measures and remedial procedures that can avoid many potential problems.
    Enterprises should set up reasonable organizational structure. The enterprise shall formulate company policies related to network security, data security, physical security and other work contents, and conduct security assessment according to the performance of employees.

    Log in to Reply
  4. Yingyu Wang says

    June 16, 2025 at 4:19 am

    Employee risk control strategies include:
    Establish a layered defense mechanism, encompassing the policy, technical, and physical layers, to create a structured policy framework.
    Deploy mandatory password policies, and disable high-risk features such as automatic email replies and automatic network connections.
    Strengthen human management mechanisms, focusing the SETA program on asset risk awareness, incident reporting processes, and physical security standards.
    Establish a physical-layer network traffic monitoring and response system, and configure automatic alerts for security incident responses.

    Log in to Reply
  5. Jingni Li says

    June 17, 2025 at 2:15 am

    1. Strengthen training and awareness training: Regularly carry out safety training, simulation drills to improve employees’ prevention capabilities, clarify safety policies and require them to sign and confirm.
    2. Strict authority management: Follow the principle of least authority, regularly review and adjust the authority of resignation or transfer personnel based on the authority of post assignment.
    3. Technical control and monitoring: Deploy security tools such as email filtering and terminal detection, force remote work to use VPN, encrypt devices, and restrict access from unauthorized devices.
    4. Improve response and accountability mechanisms: Establish anonymous reporting channels, develop rapid incident handling procedures, clarify penalties for violations, and reward exemplary safety behaviors.
    5. Standardize the personnel management process: new employees will be trained on safety basics, and the equipment will be withdrawn and access rights will be revoked immediately when employees leave the company.

    Log in to Reply
  6. Ruizhen Zhang says

    June 17, 2025 at 3:29 am

    Businesses should implement a comprehensive security awareness program designed to increase information security awareness among all users. This includes not only basic security awareness training, but also security skills training tailored to the specific role. Through continuous security education, employees can be more aware of the importance of information security and reduce security breaches caused by ignorance.
    And clearly stipulate security specifications such as password security, email phishing protection, and social engineering defense, and ensure that these policies are strictly enforced. For example, prohibit sharing passwords, avoid default passwords, and encourage the use of strong passwords or phrases that are difficult to guess.

    Log in to Reply
  7. Yufei Zhu says

    June 17, 2025 at 4:02 am

    I think that giving every employee disciplined training can control and mitigate the risks posed by employees. This is because most employee risks are actually brought about by the unconscious behavior of employees. Organize and implement graded training for employees to enhance their safety awareness. And enterprises can follow the principle of minimizing permissions, using role management and other ways to assign permissions. At the same time, it is also necessary to monitor the behavior of employees, and there are effective ways to pursue responsibility after the occurrence of security incidents.

    Log in to Reply
  8. Siyu Li says

    June 17, 2025 at 4:05 am

    Controlling employee-related risks in information security requires a comprehensive approach that combines technical measures, organizational policies, and behavioral management. Below is several measures I suggested.
    1. Perform thorough screenings for new hires and periodic reviews for existing staff, especially in high-risk positions. Conduct thorough exit interviews to identify grievances, revoke all access immediately, and escort departing employees to prevent last-minute sabotage.
    2. Arrange ongoing Cybersecurity Training which shows clear security policies and accountability, especially consequences for violations, and multiple risks brought by careless and unintentional behaviors and solutions.
    3. Technical and Access Controls such as MFA and data monitoring & protecting.
    4. Develop an insider threat response plan and conduct regular Security Audits and Updates. Risk modeling and response analysis can also be conducted at the initial stage.
    5. Assess third- party risks such as vendors in advance and create secure work environments which means that forms a physical security integration.

    Log in to Reply
  9. Jiaxuan Ma says

    June 17, 2025 at 6:31 am

    Institute a safety awareness training program throughout the company before they make costly errors.
    1. Perform security awareness training in various ways like classroom-style training, security awareness website, helpful hints, visual aids and promotions.
    2. Help employees understand how to prevent incidents from happening Such as lock your desk and cabinet when leave, lock your computer when walk away, do not store sensitive information when connect to wireless network, utilize firewalls, use a strong password, conduct phishing IQ test.
    3. Help employees understand what to do if attack occurs. Do not panic. Disconnect from the Internet. If computer cannot boot, start in Safe Mode or boot from the Windows boot disk. Back up important data. Install anti-virus software. Perform scan of system.

    Log in to Reply
  10. Meiyan Liu says

    June 17, 2025 at 9:44 am

    To enhance security management, measures can be taken in three aspects. First, establish Security Awareness and Training Programs (SETA), carrying out structured training via classroom or online methods and regularly updating contents like password security. Second, clarify policies, responsibilities and accountability mechanisms, formulating security policies on data processing, standardizing requirements and defining consequences for violations. Third, promote behavioral management and cultural change, relying on leaders to set an example and drive employees to strengthen security awareness.

    Log in to Reply
  11. Wenhao Liu says

    June 18, 2025 at 7:28 am

    Employee risks can be controlled through:
    • Comprehensive Security Training: Regular sessions on topics like password security, phishing detection, and data handling.
    • Clear Policies and Enforcement: Implementing strict rules (e.g., no personal devices on the network) and enforcing consequences for violations.
    • Technical Controls: Using tools like firewalls, antivirus software, and access controls to limit employee access to sensitive systems.
    • Awareness Campaigns: Posters, email reminders, and interactive quizzes to keep security top-of-mind.
    • Monitoring and Auditing: Regularly reviewing employee activities (e.g., login logs) to detect unusual behavior early.
    • Incident Response Plans: Training employees on how to report security incidents promptly, such as suspicious emails or data leaks.

    Log in to Reply
  12. Yiwen Lou says

    June 18, 2025 at 9:04 am

    Companies can boost employees’ security awareness through training. The training topics might cover things like physical security (keeping offices locked), desktop security (locking screens), wireless network safety, password rules, phishing scams, malware (viruses, trojans, spyware), file sharing rules, and more. It’s like a crash course on what to watch out for, how to prevent issues, and what to do if something goes wrong—kinda like a safety drill for cyber threats!
    Also, companies need to set up a smart organizational structure. That means making clear policies about network security, data protection, physical security, and so on. They should also assess employees’ security performance regularly. It’s like having a rulebook for how everyone should handle sensitive stuff, plus check-ins to make sure people are following the rules.

    Log in to Reply
  13. Xintong Zhang says

    June 18, 2025 at 10:12 am

    The measures to control the risks brought by employees are as follows:
    1. Establish a Hierarchical Security Training System (SETA)
    Establish a three-tiered “awareness-training-education” framework: popularize basic security knowledge such as phishing prevention and password policies for all employees, and provide customized training on firewall operations, data processing, etc., for different positions.
    2. Implement Standardized Security Policies
    Formulate policy frameworks covering password management, data disposal, device access, and workstation security, clarify prohibited behaviors such as weak passwords and unencrypted devices, as well as operational standards such as data backup and media destruction, and ensure implementation by management.
    3. Clarify Roles and Accountability Mechanisms
    Clearly define the responsibilities of the executive layer in promoting security culture, security officers in overall coordination, data owners in approving access rights, and end-users in complying with protocols, track violations through audits, and incorporate compliance into performance appraisals.
    4. Establish Continuous Monitoring and Effectiveness Evaluation
    Track indicators such as training completion rate, security incident report volume, and policy violation rate, evaluate employees’ response capabilities through simulated phishing emails, and regularly audit security practices such as device locking rate and system update.

    Log in to Reply
  14. Meiqi Yan says

    June 18, 2025 at 10:50 am

    The company can reduce the safety risks brought by employees through several simple and effective methods: conduct regular training to teach employees to identify common scams such as phishing emails; establish clear rules such as the need to use complex passwords, prohibiting the random insertion of USB drives; manage permissions to only allow employees to access the data necessary for work; encourage reporting of problems and promptly reporting them without punishment; implement simple protective measures such as double verification; most importantly, the leaders should take the lead in attaching importance to it, making safety an integral part of the corporate culture rather than an additional burden. Just like teaching children to look at traffic lights when crossing the road, once good habits are formed, the risks will naturally decrease.

    Log in to Reply
  15. Liyuan Zhou says

    June 18, 2025 at 11:44 am

    Institutional Norms
    1.Set clear data security rules: Forbid using personal phones/computers to handle company secrets, or sending files via unsafe channels like WeChat. Violations will lead to penalties.
    2.Give employees only the access they need for their jobs (e.g., finance staff can only view financial data). When someone quits or transfers, immediately take back their account logins and office access cards.

    Training and Assessments
    1.Hold security training every 3 months to teach employees how to spot scam emails, create strong passwords, and understand real-life risks through examples.
    2.New hires must pass a security knowledge test to start work. Employees handling core data (like IT or legal teams) need extra security certifications.

    Technical Monitoring
    1.Use software to automatically track data on employees’ computers. If someone tries to mass-download files or send info to external emails, the system will block it and raise an alarm.
    2.For 30 days after an employee resigns, closely monitor their actions to prevent data deletion or theft. Have them sign a confidentiality agreement stating they’ll pay damages for leaks.
    Accountability Measures
    1. Set up an anonymous reporting system so employees can supervise
    each other. People who report valid issues will get rewards.
    2. Investigate every security incident. Responsible employees will face fines, and their departments will lose points in performance reviews.

    Log in to Reply
  16. Yiying Chen says

    June 18, 2025 at 12:50 pm

    Firstly, strong security policies is necessary. Enterprise should document clear guidelines on password management, data handling, and incident reporting to standardize practices. Simultaneously, maintaining an incident response plan ensures breaches are addressed promptly, minimizing damage and enabling rapid recovery from security incidents.
    Second, training is critical. Enterprises can promote mandatory security education, training, and awareness programs that educate employees on threats like phishing and malware, while reinforcing compliance through regular workshops and simulations. Such programs help build awareness and ensure employees understand best practices to mitigate unintentional security lapses.
    Last but not least, access control and privilege management should enforce the principle of least-privilege access, revoking unnecessary permissions promptly after role changes. Additionally, deploying role-based access control ensures data access is limited based on job responsibilities, reducing the risk of unauthorized access from over-provisioned accounts.

    Log in to Reply
  17. Zuqi Zhang says

    June 19, 2025 at 4:31 am

    First of all, you gotta train them. Make sure they know what to look out for, like phishing emails and how to handle sensitive info.
    Second, set up good security policies. Strong passwords, two-factor authentication, and rules about what they can and can’t do on company devices.
    Third, keep an eye on things. Monitor access to important data and systems, and make sure people are only getting into what they need for their job.
    And lastly, create a positive work environment. Happy employees are less likely to mess up on purpose or be tempted to do something bad.

    Log in to Reply
  18. Wenhao GUO says

    June 19, 2025 at 7:58 am

    Employee risks can be controlled through a multi-faceted approach combining training, policy enforcement, and technical safeguards. First, mandatory security training programs are essential, providing regular education on threats like phishing, malware, and best practices for password management and data handling, while simulations and workshops enhance practical awareness to mitigate unintentional errors. Second, implementing clear security policies is crucial, defining strict guidelines for password complexity, data access, and incident reporting, alongside a robust incident response plan to address breaches promptly and minimize damage. Third, access control must adhere to the principle of least privilege, using role-based management to assign permissions based on job responsibilities, revoking unnecessary access promptly when roles change to prevent privilege abuse. Additionally, monitoring employee behavior through secure systems and establishing clear accountability mechanisms for security incidents helps deter intentional threats, while restricting the use of personal devices and enforcing data transfer protocols reduces risks from unauthorized tools. This comprehensive strategy ensures employees are both educated and constrained by policies, significantly reducing the likelihood of security lapses.

    Log in to Reply
  19. Jianwei Huang says

    June 19, 2025 at 9:43 am

    To control employee risks, start with regular training that’s simple and clear, so everyone knows how to spot phishing or use strong passwords. Make security policies easy to follow, like not sharing accounts or logging out when leaving a desk. Use tools that limit what employees can access—only give them the data they need for their jobs. Monitor systems gently to catch mistakes early, but don’t make people feel micromanaged. Create a culture where reporting issues isn’t scary, so if someone messes up, they can speak up without fear. Also, update security measures often, like changing passwords regularly and using software that blocks threats. Finally, treat employees well—happy workers are less likely to cause problems on purpose, and a supportive environment cuts down on careless mistakes too.

    Log in to Reply
  20. Xiaojin Liu says

    June 19, 2025 at 11:23 am

    Conduct safety awareness education and training, such as: new employee onboarding training; specialized training for specific positions; phishing simulation tests.
    Clarify the system and enforcement mechanism, such as: stipulate allowed/prohibited behaviors; password and access control system; incident reporting process.
    Technical protection measures, such as: mandatory installation of antivirus software and firewalls, and enable automatic patch updates; monitor and block unauthorized data transmission; strictly set access permissions.
    Safety culture construction, such as: senior management should lead by example; strengthen sense of responsibility through safety slogans; reward those who report vulnerabilities or have outstanding safety performance.

    Log in to Reply
  21. Jiwei Yang says

    June 19, 2025 at 10:40 pm

    Controlling information security risks for employees requires a multi-faceted approach. Enhance employees’ ability to identify phishing and other attacks through cybersecurity training, and strengthen warnings by simulating the Target case; enforce compliance with security protocols to prevent ignoring alerts or disabling key functions (such as FireEye’s automatic deletion). Strengthen access management for suppliers, conduct regular audits and limit permissions to avoid repeating the Target supplier credential leakage pattern. Enhance the professional skills of the security team to avoid misjudging risks. Cultivate a security culture, with executives taking responsibility and establishing an whistleblowing mechanism. At the same time, monitor employee access through technical means, enforce configuration standards, and conduct regular security audits. The Target case proves that only by integrating training, processes, technology and cultural measures can we fill in the human vulnerabilities and build an effective security defense line.

    Log in to Reply
  22. Shouxi Mou says

    June 20, 2025 at 12:46 am

    1. Training​​
    Teach basic security (phishing, passwords)
    Regular refreshers
    ​​2. Policies​​
    Clear rules for data handling
    Enforce consequences
    ​​3. Tech Controls​​
    Auto-backups
    Access limits
    ​​4. Monitoring​​
    Check for policy violations
    Reward safe behavior

    Log in to Reply
  23. Yan Liu says

    June 20, 2025 at 1:09 am

    To control employee risks, organizations should implement multi-faceted strategies. First, conduct regular security awareness training to educate employees on best practices, such as strong password management and phishing detection. Second, enforce strict privilege management, granting only minimum necessary access and regularly reviewing permissions. Third, establish clear security policies and consequences for violations. Fourth, implement technical controls like data loss prevention (DLP) systems and monitor insider activities. Finally, foster a security-conscious culture through leadership exemplification and peer accountability, balancing operational efficiency with risk mitigation.

    Log in to Reply
  24. Huiling Huang says

    June 20, 2025 at 4:12 am

    To control security risks from employees, companies need to focus on daily management and raising awareness. First, provide regular training—use real-life examples to show them how to spot phishing emails, why they must lock their computers when away, and why important files shouldn’t be left lying around. Make sure everyone understands which actions are risky.

    Then, set simple, clear rules: no easy passwords (like “123456”), never share accounts, and always get IT approval before downloading software. Repeat these rules often so they become habits.

    Also, use technical tools: install protective software on computers to block suspicious links and viruses automatically. Limit access to important files and systems—only let people see or change things they need for their jobs. This way, even if someone makes a mistake, the damage is limited.

    Managers should also pay attention to employees’ moods. If someone seems unhappy with the company or acts strangely, talk to them early or add extra supervision to prevent intentional leaks.

    Finally, create a culture that values security. Host small events to remind everyone, and reward employees who report issues. Make them feel that security is everyone’s responsibility, not just the IT team’s job. Doing all these things together can gradually reduce risks from employees.

    Log in to Reply
  25. Rong Su says

    June 21, 2025 at 3:46 am

    To enhance security management, organizations should implement a three-pronged approach: establishing comprehensive security awareness programs with structured training on topics like password hygiene that are regularly updated; developing clear policies with defined responsibilities, accountability mechanisms, and standardized data handling protocols that specify violation consequences; and driving behavioral change through cultural transformation initiatives where leadership sets the example to foster stronger security consciousness among all employees. This holistic strategy addresses technical, procedural, and human factors to create a robust security posture.

    Log in to Reply
  26. Xinshang Pei says

    June 21, 2025 at 12:25 pm

    A robust security awareness program should encompass critical topics ranging from physical workspace protection to sophisticated cyber threats, including but not limited to secure wireless network practices, password management protocols, identification of phishing attempts and malicious software, as well as intellectual property compliance. Effective training goes beyond theoretical knowledge by providing actionable guidance on threat recognition, preventive countermeasures, and incident response protocols to empower employees as active defenders of organizational assets.
    Complementing these educational initiatives, enterprises must establish clear governance frameworks featuring well-defined cybersecurity policies that address digital, physical, and data protection requirements. This structural foundation should incorporate regular security performance evaluations tied to policy compliance metrics, creating accountability while reinforcing desired security behaviors throughout the organizational culture. The synergy between continuous security education and thoughtfully designed policy enforcement mechanisms forms a sustainable defense against both internal vulnerabilities and external threats.

    Log in to Reply
  27. Gao Yujing says

    June 21, 2025 at 2:15 pm

    Strategies to Control Employee Risks​​
    ​​1. Technical Controls (Block Attack Paths)​​
    ​​Access Control​​:
    Enforce ​​least privilege​​ (grant only job-essential access).
    Mandate ​​MFA​​ for all, especially privileged accounts (e.g., IT admins).
    ​​Data Loss Prevention (DLP)​​:
    Deploy endpoint DLP (block USB/email data exfiltration).
    Apply ​​data classification tags​​ in cloud (e.g., block “Confidential” downloads).
    ​​Behavior Monitoring​​:
    Implement ​​UEBA​​ (detect anomalous logins/mass downloads).
    Retain ​​audit logs​​ ≥180 days for critical operations.
    ​​2. Process Governance (Reduce Human Errors)​​
    ​​Access Lifecycle Management​​:
    Automate access revocation (on resignation/role change).
    Quarterly reviews of privileged accounts (password/permission resets).
    ​​Secure Development​​:
    Mandatory code scans (prevent backdoors).
    Dual approval for production access (e.g., database changes).
    ​​Incident Response​​:
    Establish ​​anonymous reporting channels​​.
    Create ​​insider threat playbooks​​ (with legal forensics).
    ​​3. Continuous Education (Enhance Awareness)​​
    ​​Practical Training​​:
    Quarterly ​​phishing simulations​​ (click rates tied to performance reviews).
    Annual ​​red team drills​​ (test response capabilities).
    ​​Role-Based Learning​​:
    Developers: Secure coding (prevent SQLi).
    Executives: Social engineering defense (spot “CEO fraud”).
    ​​Security Culture​​:
    ​​Bug bounty programs​​ ($500/reported vulnerability).
    “No-blame” reporting (encourage admitting mistakes).
    ​​4. Culture & Management (Eradicate Malice)​​
    ​​Psychological Support​​:
    Regular engagement surveys (identify revenge risks).
    Provide counseling (reduce work stress).
    ​​Privileged Role Oversight​​:
    Background checks (pre-hire/annual).
    Mandatory vacations (expose unauthorized operations).
    ​​Transparent Incentives​​:
    Audit compensation fairness (prevent resentment-driven attacks).

    Log in to Reply
  28. Yangyu Zhang says

    June 21, 2025 at 5:40 pm

    Controlling employee-related information security risks requires a multi-layered strategy that combines technology, culture, processes, and continuous adaptation. Below is a structured approach based on industry best practices and lessons from breaches like Target’s:
    1.Technical Controls: Limit Access & Monitor Activity
    2.Human-Centric Controls: Build Security Awareness
    3.Process & Governance: Formalize Risk Management
    4.Cultural Controls: Foster Security as a Shared Duty
    5.Adaptive Measures: Evolve with Threats

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in