Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call Eclipse Integrated Systems at 800-340-0505 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Business Computing Internet Malware Software Network Security Google Business Management Microsoft Windows 10 Computer Hosted Solutions Innovation User Tips Backup Productivity Business Productivity Windows Apps Email Smartphone Cybersecurity Cybercrime Efficiency Hardware Mobile Devices Operating System Law Enforcement Virtualization Disaster Recovery Browser VoIP Ransomware Android Managed IT Services Small Business Business Continuity IT Support Data Security Internet of Things Telephone Systems Mobile Device Management Money Miscellaneous Passwords Holiday Mobility Server Office 365 Microsoft Office Smartphones Quick Tips Phishing communications Data Backup Chrome Health App Information Technology Unsupported Software Government Cloud Computing Outsourced IT Tech Term Google Drive Data Recovery Application Saving Money Vulnerability Update Wireless Communication Collaboration Password IT Services Best Practice Risk Management Workplace Tips Wi-Fi Social Gadgets Managed Service Provider Antivirus USB Alert Social Media Politics IT Support Upgrade Two-factor Authentication Data Management Managed IT Facebook Spam Data Current Events Windows 10 BDR Shortcut Identity Theft Computers Hacking Work/Life Balance Save Money User Error Office tips Blockchain Google Docs Users Employer-Employee Relationship Meetings Artificial Intelligence Office Network Legal Search Cleaning Data Protection The Internet of Things Hosted Solution Flexibility DDoS Mobile Computing Battery History End of Support Save Time Private Cloud Sports Cortana Commerce Proactive IT Automobile Recovery HaaS Cost Management Automation Fraud Tech Support Personal Information Data Storage Patch Management Going Green Transportation Internet Exlporer Apple OneNote Samsung Wireless Technology eWaste WiFi Managed IT Services Encryption Excel Streaming Media Audit VPN Humor Telephony Social Engineering Bandwidth Television Remote Computing Computer Care iPhone Mobile Security Avoiding Downtime Video Games Webinar Identity Chromecast Gifts HBO Virtual Reality Adobe Microsoft Word Identities Entertainment Microsoft Excel IT solutions Data Privacy Credit Cards Education Applications Nanotechnology Scam Maintenance Mobile Device Language File Sharing Windows 10s IT Management Licensing Trending Root Cause Analysis Router Employer Employee Relationship Data storage Device Security Experience Storage Lithium-ion battery Scalability Distributed Denial of Service Bluetooth Solid State Drive Administrator FAQ IT Solutions Devices Point of Sale Travel Augmented Reality Computer Accessories Marketing SaaS Virus Phone System How To Fax Server Hard Disk Drive Hacker Access Charger Spyware Tablets Unified Threat Management Proactive Music Legislation WIndows Server 2008 Advertising Keyboard Wireless Charging NFL Gmail Vendor Management Upgrades Reputation Websites Analytics Files Comparison Wearable Technology Data Breach Edge Word Laptop Consultant Data Theft Big Data Specifications Screen Mirroring Black Market Outlook iOS Hiring/Firing Robot Evernote Ciminal Worker Commute Windows Ink Training Touchpad Touchscreen Computing Books Sales Cast Running Cable SharePoint PDF Benefits Networking Project Management Google Maps Settings Company Culture Instant Messaging App store Electronic Medical Records Retail BYOD Sync Computer Fan Text Messaging Smart Technology Workers Operating Sysytem IT budget Uninterrupted Power Supply Data Loss Managing Stress Emails Safety Budget Conferencing Teamwork WannaCry Updates Remote Monitoring Emergency Monitors Disaster Hard Drive Worker CrashOverride Relocation Cache

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login