Broken Cyber Windows Theory (By Javvad Malik)

Traditional approaches often focus on punitive measures or dry, technical training that fails to engage employees

Have you ever walked down a street with broken windows, burnt out cars, graffiti and felt a bit uneasy? There’s a reason for that, and it’s not just about aesthetics. The Broken Windows Theory, introduced by social scientists James Q. Wilson and George L. Kelling in 1982, suggests that visible signs of crime and antisocial behavior encourage further crime and disorder. But what does this have to do with cybersecurity? More than you might think.

The Cybersecurity Parallel: Neglected Digital Environments

In many organizations, cybersecurity awareness feels like a losing battle. Employees ignore security policies, download unapproved software, and use weak passwords. It’s as if our digital environments are full of “broken windows,” signaling that it’s a culture where no one really cares about security.

Traditional approaches often focus on punitive measures or dry, technical training that fails to engage employees. It’s like trying to reduce crime by simply increasing fines, without addressing the underlying issues that make an area feel unsafe or neglected.

Applying the Broken Windows Theory to Cybersecurity

Just as fixing broken windows and cleaning up graffiti can reduce crime by fostering a sense of order and care, we can apply similar principles to our digital environments:

  1. Create a Culture of Vigilance: Encourage employees to report potential security issues, no matter how small. This is like neighborhood watch programs for your network.
  2. Address Small Issues Quickly: Respond promptly to minor security infractions. This shows that security is taken seriously at all levels.
  3. Improve the “Look and Feel” of Security: Make security tools and processes user-friendly and aesthetically pleasing. A clean, well-designed security interface is like a well-maintained storefront.
  4. Celebrate Security Wins: Publicly recognise employees who spot phishing attempts or follow good security practices. This is akin to community awards for neighborhood improvement.
Practical Steps for Implementation

1. Conduct a Digital Environment Audit
Walk through your organization’s digital spaces as an average user would. Where are the “broken windows”? Look for outdated software, clunky security processes, or confusing policies.

2. Implement a “See Something, Say Something” Program
Create an easy way for employees to report potential security issues. Make it as simple as sending a quick message or clicking a button.

3. Redesign Security Communications
Transform your security awareness materials. Replace dense text with infographics, short videos, or even memes. Make security information as engaging as a well-designed public space.

4. Create Security Champions
Identify and empower individuals across departments to be security advocates. These champions can help maintain a secure “neighborhood” in their area of the organization.

5. Regular “Digital Community” Events
Host regular cybersecurity events that feel more like community gatherings than lectures. Think cybersecurity fairs, hacking demos, or even escape rooms with a security twist.

The Path to a Strong Security Culture

By applying the principles of the Broken Windows Theory to cybersecurity, we can create digital environments where security feels natural and everyone plays a part. It’s not just about preventing breaches; it’s about fostering a community where secure behavior is the norm.

As we move forward, let’s reimagine our approach to cybersecurity awareness. Instead of building walls and enforcing rules, let’s create digital neighborhoods where everyone takes pride in keeping things secure.

Every fixed “window” in your digital environment is a step towards a more secure future. So, let’s roll up our sleeves and start cleaning up our digital streets. The neighborhood—and your data—will thank you.

Javvad Malik
Javvad Malik
Lead Security Awareness Advocate
KnowBe4
- Advertisement -

Disclaimer: The views expressed in this feature article are of the author. This is not meant to be an advisory to purchase or invest in products, services or solutions of a particular type or, those promoted and sold by a particular company, their legal subsidiary in India or their channel partners. No warranty or any other liability is either expressed or implied.
Reproduction or Copying in part or whole is not permitted unless approved by author.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Sign Up for CXO Digital Pulse Newsletters

Sign Up for CXO Digital Pulse Newsletters to Download the Research Report

Sign Up for CXO Digital Pulse Newsletters to Download the Coffee Table Book

Sign Up for CXO Digital Pulse Newsletters to Download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch