The Startup Founder’s Security Guide Part 2: People
In part 2 of the "Startup Founder’s Security Guide," we focus on people in your cybersecurity strategy. Learn how to educate your team to mitigate risks from human error and insider threats.

Youssef Mahmoud

Introduction
People are the most important asset in any company. They build the technology, processes, and culture that drive success. However, from a security perspective, many teams view people as the weakest link in a security program—and with good reason. Employees come from diverse backgrounds, have varying levels of security knowledge, and use different tools and techniques in their daily roles.
Security awareness training is often perceived as boring and ineffective—a mere checkbox exercise with repetitive videos every six months. To change this perception, we need to provide practical, hands-on examples of risks and benefits, allowing employees to actively engage with security concepts.
Let’s start by addressing common security risks that impact employees across all roles in their daily activities and explore how we can educate them effectively.
Email Security
Every employee in an organization uses email daily, making it a prime target for cyberattacks. Security training should focus on key threats and best practices, including:
- Recognizing Phishing Attacks: Employees should be able to identify phishing emails that attempt to steal sensitive information. Clear internal policies should outline what employees should expect from colleagues and external partners—no one should request passwords, credit card details, or other sensitive data via email.
- Avoiding Email Spoofing Attacks: Employees must learn to differentiate between legitimate emails and spoofed ones. Implementing tools like DMARC, DKIM, and SPF can help detect and prevent spoofed emails.
- Using Corporate Emails Responsibly: Employees should avoid using corporate email addresses for personal accounts, especially on high-risk services, to minimize exposure.
- Additional Tips: Regularly updating email passwords, using multi-factor authentication (MFA), and reporting suspicious emails promptly.
Password Management
Passwords remain a significant security challenge, but employees can be educated on better management practices:
- Using SSO and Password Managers: When available, employees should use Single Sign-On (SSO) for secure authentication. Password managers help generate and store strong passwords, eliminating the need for memorization.
- Creating Strong Passwords: Employees should avoid weak or reused passwords. Instead, they should use complex, unique passwords for each service.
- Enabling Multi-Factor Authentication (MFA): MFA should be enabled on all accounts to add an extra layer of security.
- Avoiding Public Exposure: Employees should never enter passwords in public places without masking them and should be cautious about entering credentials on unsecured networks
Browsing Security
Safe browsing habits are crucial to preventing cyber threats. Employees should be trained on:
- Verifying Websites: Always check the URL bar to ensure they are on the correct website and beware of typo-squatting (attackers registering similar domain names to trick users).
- Understanding HTTPS vs. HTTP: Employees should know how encrypted HTTPS protects sensitive data and why they should avoid entering personal or corporate credentials on HTTP sites.
- Recognizing Redirection Attacks: Some phishing sites redirect users from a legitimate website to a malicious one. Employees should verify links before clicking.
- Handling External Links: While it’s common to advise employees not to click on external links, this isn't always practical. Instead, they should be trained to identify and verify links safely, particularly those sent via email.
Device Security
Securing devices is fundamental to protecting sensitive information. Employees should follow these best practices:
- Enabling Full Disk Encryption: This ensures that data remains secure even if a device is lost or stolen.
- Requiring Strong Authentication: Devices should always be locked with strong passwords, biometrics, or PINs.
- Implementing Automatic Screen Lock: Devices should lock automatically after a short period of inactivity to prevent unauthorized access.
- Using Antivirus and Endpoint Security Tools: Employees working remotely or using personal devices should treat them as corporate assets by installing security software and following company policies.
- Avoiding Sensitive Data Storage on Personal Devices: Employees should not store unencrypted corporate files on personal devices.
Common Cyber Attacks
Employees should be aware of the most common attack types, including:
- Phishing and Spear Phishing – Social engineering attacks that trick users into divulging sensitive information.
- Business Email Compromise (BEC) – Attackers impersonate executives or vendors to request fraudulent payments.
- Ransomware – Malicious software that encrypts files and demands a ransom for decryption.
- Malware and Keyloggers – Malicious programs that steal information or monitor user activity.
- Typosquatting and Fake Login Pages – Attackers create deceptive websites that mimic legitimate ones to steal credentials.
Role-Specific Training
One reason security training often feels ineffective is that it treats all employees the same. Different roles face different risks and require tailored training:
- Developers: Should be trained on secure coding practices, supply chain attacks, and vulnerability management.
- HR and Finance Teams: Must learn how to securely handle sensitive files, recognize payroll fraud attempts, and verify external requests for sensitive information.
- Executives: Require advanced security awareness due to their increased risk of targeted attacks (e.g., executive phishing, CEO fraud).
Security training should be adapted to the organization's size and risk level—a small startup with two developers does not face the same threats as an enterprise with thousands of employees. By making training relevant to each role, we increase engagement and effectiveness.
Responding to Security Incidents
Even with strong preventive measures, security incidents can still occur. Employees should know how to respond effectively:
- Reporting Suspicious Activity: Employees should immediately report any suspicious emails, unauthorized access attempts, or unusual system behavior to the IT or security team.
- Following Incident Response Procedures: Organizations should have clear incident response guidelines that outline what employees should do in case of a breach or attack.
- Point of Contact: A dedicated security team or helpdesk should be available for employees to contact in case they suspect a security threat. Contact details should be easily accessible.
- Isolating Affected Systems: If an attack is suspected, employees should be trained to disconnect affected devices from the network to prevent further damage.
- Avoiding Panic: Employees should remain calm and follow the organization’s security protocols instead of taking unapproved actions that might worsen the situation.
Conculsion:
Security awareness should not be a one-time exercise or a check-the-box requirement. It needs to be continuous, engaging, and practical. Employees should not only understand security risks but also experience them through hands-on labs and real-world scenarios. By making security training relevant and actionable, we empower employees to become the strongest link in the organization’s security program.