croom new

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call Eclipse Integrated Systems at 800-340-0505 for more information.

Credit Card Theft and Identity Theft are Not the S...
Tip of the Week: Did You Know Your Computer Can Do...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Network Security Hackers Internet Google Business Management Malware Software Microsoft Computer Innovation Windows 10 Backup Hosted Solutions Productivity User Tips Tech Term Productivity Cybersecurity Business Apps Email Windows Mobile Devices Managed IT Services Cybercrime Smartphone Hardware Efficiency Operating System Saving Money Virtualization Browser Internet of Things Law Enforcement Small Business Smartphones Disaster Recovery communications VoIP IT Support Collaboration Data Security Data Backup Ransomware Business Continuity Data Recovery Android Chrome Mobility Microsoft Office Mobile Device Management Telephone Systems Communication IT Support Server Miscellaneous Passwords Office 365 Holiday Phishing Wireless Workplace Tips Quick Tips Money Data Vulnerability Social Media Government Unsupported Software Network Application App Information Technology Wi-Fi Update Cloud Computing Health Outsourced IT Password Risk Management BDR Best Practice Gadgets IT Services Google Drive Cost Management Social Employer-Employee Relationship Shortcut Two-factor Authentication Work/Life Balance Facebook Current Events Alert Office tips USB Managed IT Computers Streaming Media Artificial Intelligence Antivirus Hacking Upgrade User Error Data Management Spam Identity Theft Save Money Patch Management Windows 10 Users Sports Managed Service Provider Politics Recovery Meetings Office End of Support Battery Going Green Cleaning Private Cloud Apple Samsung OneNote Automation Tech Support Gmail Excel Networking iPhone Managing Stress HaaS eWaste WiFi Managed IT Services Mobile Computing Transportation DDoS Devices Internet Exlporer Cortana Automobile Audit Wireless Technology Proactive IT Personal Information The Internet of Things Save Time Mobile Security Bandwidth Company Culture Hosted Solution Legal Television Google Docs Blockchain Search Wireless Charging Commerce Fraud Computer Care VPN Telephony Flexibility Humor Data Storage Social Engineering Encryption Data Protection Router Remote Computing History Maintenance Managed IT Service Books File Sharing Language Budget Wearable Technology Outlook Evernote Upgrades Windows Ink Ciminal Hard Drive Instant Messaging IT Management RAM Experience IT solutions Computing How To Avoiding Downtime Cast Sales Trends Text Messaging Licensing Device Security Cables Storage Scam Nanotechnology Internet Explorer Chromecast Point of Sale Consultant Google Maps Project Management Hiring/Firing iOS Chromebook Files IT Solutions FAQ Mobile Device Microsoft Teams Phone System Windows 10s App store BYOD Retail Training A.I. Travel Virus Voice over Internet Protocol Video Games Laptop Employer Employee Relationship Root Cause Analysis Threat Advertising Running Cable Sync Workers Touchscreen Data Loss IT budget Benefits Printing Charger G Suite SharePoint Music Spyware Solid State Drive Reputation Conferencing Settings Movies Bluetooth Robot Distributed Denial of Service Tablets Proactive Information Touchpad Legislation Computer Accessories Augmented Reality PowerPoint Updates Electronic Medical Records Analytics Smart Technology Computer Fan Google Assistant Trending Marketing Virtual Reality WIndows Server 2008 SaaS Bring Your Own Device Data storage NFL Hacker Hard Disk Drive Identity Black Market HBO Gifts Business Intelligence Lithium-ion battery Fax Server Entertainment Emails Websites Amazon Comparison Connectivity Administrator Adobe Microsoft Word Safety Teamwork Big Data Microsoft Excel Identities WannaCry Value Education Data Breach Unified Threat Management Hybrid Cloud Word Edge Keyboard Data Privacy Credit Cards Unified Communications Webinar Data Theft Virtual Assistant Uninterrupted Power Supply Scalability Operating Sysytem Screen Mirroring Specifications Vendor Management Downloads PDF Access Worker Commute Applications Monitors Twitter Relocation Plug-In Worker Remote Monitoring and Management Disaster Cache Remote Monitoring Emergency CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login