{"id":21624,"date":"2021-10-26T09:30:16","date_gmt":"2021-10-26T08:30:16","guid":{"rendered":"\/gb\/en\/blog\/?p=21624"},"modified":"2021-10-26T08:52:39","modified_gmt":"2021-10-26T07:52:39","slug":"cybersecurity-awareness-storytelling","status":"publish","type":"post","link":"\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/","title":{"rendered":"Why Storytelling is Crucial to Raising Cybersecurity Awareness"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The power of storytelling isn\u2019t something you\u2019d normally pair with the highly technical field of cybersecurity awareness, but RingCentral\u2019s CISO Heather Hinton believes the opposite.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.ringcentral.com\/gb\/en\/trust-centre.html\">Cybersecurity<\/a> is more than ones and zeros. In Heather&#8217;s words, this field is all about passion and problem-solving. As children, we learnt morals and social skills through fables and tales, and as adults, we&#8217;re no different. Stories are the best way to distil complexity and motivate people to solve problems together.\u00a0<\/span><\/p>\n<p>Hinton explains how businesses can tap into storytelling to engage employees and raise cybersecurity awareness in this interview.<\/p>\n<h2><b>How can organisations make cybersecurity accessible?\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When we talk about the evidence that shows people aren\u2019t embracing cybersecurity best practices, that\u2019s because we (security leaders) aren\u2019t creating content that people immediately relate to. <\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400;\">It\u2019s about switching from a technology point of view and putting scenarios into a context that people understand \u2013 telling the story of what <\/span><i><span style=\"font-weight: 400;\">could<\/span><\/i><span style=\"font-weight: 400;\"> happen.<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">For example, this month we\u2019re running a competition. My team created funny videos that depict typical cybersecurity best practices. Some of them are seriously funny. We have videos on password reuse, USB sharing, compromised email and many more. Part of the reason we&#8217;re doing this is so when people see a similar situation, they&#8217;ve got a story they remember. We\u2019re sharing the videos virtually across RingCentral\u2019s internal groups and getting people to vote for their favourite with the chance of winning a prize.\u00a0<\/span><\/p>\n<h2><b>Is there any other advice that you would give to business leaders?\u00a0<\/b><\/h2>\n<p>In a variation on storytelling, I believe in doing fire drills. You do fire drills when you&#8217;re at school, and everybody learns how to leave the building. You have to be very, very careful how you do it. Internal fire drills beyond the Incident Response Team are a great way to get people involved. Again, you have to be careful how you do it because it could be messaged incorrectly.<\/p>\n<p><span style=\"font-weight: 400;\">One of the things with cybersecurity is that everybody loves to tell accounts of when they were involved in an incident. When cybersecurity people get together, it becomes this contest on who resolved the most \u2018exciting\u2019 incident. Everybody compares notes on what is the scariest thing that happened to them and all that. More people should share how they helped, what they saw and what they learned in the public domain. Again, it\u2019s about bringing the story to more people.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A lot of security leaders do this with their companies through activities like <a href=\"https:\/\/www.itgovernance.co.uk\/social-engineering-attacks\">social engineering<\/a> exercises.\u00a0<\/span><\/p>\n<h2>What are social engineering exercises?<\/h2>\n<p><span style=\"font-weight: 400;\">There\u2019s a show called White Collar. It&#8217;s <em>very loosely<\/em> based on a famous conman who got caught by the FBI and put into jail. The FBI eventually makes him a consultant to catch similar criminals. His role serves a similar purpose to <a href=\"https:\/\/www.csoonline.com\/article\/3238128\/what-is-ethical-hacking-and-how-to-become-an-ethical-hacker.html\">what we see in ethical hackers<\/a> today. It\u2019s all about finding vulnerabilities. In White Collar, the ex-conman achieves this through social engineering. In one episode, the main character goes into a bank, steals the identity badge off of an employee so that he can use the related proximity part to move through the building. That&#8217;s social engineering for you.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That&#8217;s one way to get people to think about risk in real terms because it&#8217;s always when you let your guard down that things happen. <\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400;\">The problem with cybersecurity is we have to be right 100% of the time. Our attackers have to be right only once. The odds are in their favour, not mine.\u00a0<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">From a cybersecurity point of view, that\u2019s why we don&#8217;t say, \u201cIf we are attacked,\u201d we say, \u201cWhen we are attacked,\u201d how quickly can we respond and shut the threat down?\u00a0<\/span><\/p>\n<h2><b>Where do you get ideas from to increase awareness of cybersecurity?<\/b><\/h2>\n<p>I like the content that GCHQ shares &#8211; to me, it&#8217;s the gold standard because they are approachable. For example, they&#8217;ve had a great series on cybersecurity for the farming community for the last month. Its Twitter, web pages and programmes are so different and engaging. The CISA in the US is the other place I look. Both organisations have super smart people dedicated to raising awareness of this space, and they see all sorts of stuff that I don&#8217;t see.<\/p>\n<h2><b>Are there any plans for cybersecurity education at RingCentral beyond this month?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">We will have our cybersecurity newsletter coming out in a couple of weeks with a lot of resources for RingCentral employees. I&#8217;m kicking around a couple of other ideas that others in my field have suggested (a book club is one of them). Watch this space.<\/span><\/p>\n\t\t<style>\r\n\t\t\t@media (min-width: 768px) {\r\n\t\t\t\t.bottom-cta .bottom-cta-img {\r\n\t\t\t\t\tfloat: left;\r\n\t\t\t\t\twidth: 50%;\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\t\t.bottom-cta .bottom-cta-img img {\r\n\t\t\t\twidth: 100%;\r\n\t\t\t}\r\n\r\n\t\t\t.bottom-cta {\r\n\t\t\t\tbackground: #001138;\r\n\t\t\t\tpadding: 30px;\r\n\t\t\t}\r\n\r\n\t\t\t.bottom-cta .bottom-cta-copy {\r\n\t\t\t\tpadding: 0 30px;\r\n\t\t\t\toverflow: hidden;\r\n\t\t\t\tcolor: #fff;\r\n\t\t\t}\r\n\r\n\t\t\t.bottom-cta .bottom-cta-copy .btn-primary {\r\n\t\t\t\twidth: 100%;\r\n\t\t\t}\r\n\t\t<\/style>\r\n\t\t<div class=\"bottom-cta  CID-cta-2FdM5dTp IID-cta-6a0857e4c991f\"\r\n\t\t\tdata-dl-custom-type=\"cta\">\r\n\t\t\t<div class=\"bottom-cta-img\">\r\n\t\t\t\t<img decoding=\"async\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/06\/Certs-1.jpg\" alt=\"Call to action banner\">\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"bottom-cta-copy\">\r\n\t\t\t\t<span style=\"font-size: 24px; line-height: 30px;\">RingCentral uses qualified, independent third-party auditors to perform security audits.<\/span>\r\n\t\t\t\t<span class=\"text-center\" style=\"display: block;\">\r\n\t\t\t\t<a class=\"rc-cta-shortcode btn btn-primary btn-lg\" data-dl-element=\"button\"\r\n\t\t\t\t\tclass=\"btn btn-primary btn-lg\" style=\"margin-top: 16px; font-weight: bold;\"\r\n\t\t\t\t\ttitle=\"Discover RingCentral Trust Centre\" href=\"https:\/\/www.ringcentral.com\/gb\/en\/trust-centre.html\" target=\"_blank\"\r\n\t\t\t\t\trel=\"noopener noreferrer\" data-dl-additional-info=\"RingCentral uses qualified, independent third-party auditors to perform security audits.\"\r\n\t\t\t\t\tdata-dl-name=\"RingCentral uses qualified, independent third-party auditors to perform security audits. | Visit our Trust Centre\">Visit our Trust Centre<\/a>\r\n\t\t\t<\/span>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t<\/div>\r\n\t\t\n","protected":false},"excerpt":{"rendered":"<p>The power of storytelling isn\u2019t something you\u2019d normally pair with the highly technical field of cybersecurity awareness, but RingCentral\u2019s CISO Heather Hinton believes the opposite.\u00a0 Cybersecurity is more than ones &hellip; <a href=\"\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Why Storytelling is Crucial to Raising Cybersecurity Awareness&#8221;<\/span><\/a><\/p>\n","protected":false},"author":130,"featured_media":21630,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[120,9],"tags":[90,54],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Storytelling in Cybersecurity Awareness | RingCentral UK Blog<\/title>\n<meta name=\"description\" content=\"In this interview, Heather Hinton shares creative ideas on how businesses can use storytelling to raise cybersecurity awareness.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Samantha Clayton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Storytelling in Cybersecurity Awareness | RingCentral UK Blog","description":"In this interview, Heather Hinton shares creative ideas on how businesses can use storytelling to raise cybersecurity awareness.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/","twitter_misc":{"Written by":"Samantha Clayton","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/#article","isPartOf":{"@id":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/"},"author":{"name":"Samantha Clayton","@id":"\/gb\/en\/blog\/#\/schema\/person\/f5e7b51c5870a1f2e6f07368d605e574"},"headline":"Why Storytelling is Crucial to Raising Cybersecurity Awareness","datePublished":"2021-10-26T08:30:16+00:00","dateModified":"2021-10-26T07:52:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/"},"wordCount":833,"commentCount":0,"publisher":{"@id":"\/gb\/en\/blog\/#organization"},"keywords":["security","unified communications"],"articleSection":["Interviews","Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/","url":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/","name":"Storytelling in Cybersecurity Awareness | RingCentral UK Blog","isPartOf":{"@id":"\/gb\/en\/blog\/#website"},"datePublished":"2021-10-26T08:30:16+00:00","dateModified":"2021-10-26T07:52:39+00:00","description":"In this interview, Heather Hinton shares creative ideas on how businesses can use storytelling to raise cybersecurity awareness.","breadcrumb":{"@id":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersecurity-awareness-storytelling\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RingCentral Blog","item":"\/gb\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Interviews"}]},{"@type":"WebSite","@id":"\/gb\/en\/blog\/#website","url":"\/gb\/en\/blog\/","name":"RingCentral UK Blog","description":"RingCentral News and Tips","publisher":{"@id":"\/gb\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/gb\/en\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/gb\/en\/blog\/#organization","name":"RingCentral UK","url":"\/gb\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/","url":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","contentUrl":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","width":1921,"height":416,"caption":"RingCentral UK"},"image":{"@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"\/gb\/en\/blog\/#\/schema\/person\/f5e7b51c5870a1f2e6f07368d605e574","name":"Samantha Clayton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/person\/image\/","url":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","contentUrl":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","caption":"Samantha Clayton"},"description":"Samantha is RingCentral\u2019s Content Manager for EMEA Marketing. Before joining the business, she worked in content and public relations roles. She has worked with companies in ed tech, marketing and advertising, connected home, telecoms and publishing. She has a BA in English Literature and an interest in story writing. In her spare time, she enjoys reading and live music.","sameAs":["https:\/\/www.linkedin.com\/in\/claytonsamantha\/"],"url":"\/gb\/en\/blog\/author\/samantha-clayton\/"}]}},"_links":{"self":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/21624"}],"collection":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/users\/130"}],"replies":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/comments?post=21624"}],"version-history":[{"count":0,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/21624\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media\/21630"}],"wp:attachment":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media?parent=21624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/categories?post=21624"},{"taxonomy":"post_tag","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/tags?post=21624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}