croom new

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call Eclipse Integrated Systems at 800-340-0505 for more information.

Credit Card Theft and Identity Theft are Not the S...
Tip of the Week: Did You Know Your Computer Can Do...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Internet Google Hackers Malware Business Management Software Microsoft User Tips Hosted Solutions Tech Term Productivity Innovation Computer Efficiency Windows 10 Backup Browser Cybersecurity Productivity Business Apps Managed IT Services Email Windows Mobile Devices Smartphones Saving Money Virtualization Hardware Communication Cybercrime Smartphone Small Business VoIP Collaboration Internet of Things Passwords Law Enforcement Workplace Tips communications Data Backup Data Recovery Android Disaster Recovery Operating System Miscellaneous IT Support Data Security Business Continuity Ransomware Microsoft Office Chrome Network Server Mobility IT Support Update Cloud Computing Holiday Gadgets Phishing Office 365 Users BDR Wireless Quick Tips Social Media Mobile Device Management Telephone Systems Money Data Vulnerability Unsupported Software Application Information Technology App Mobile Device Risk Management Wi-Fi Outsourced IT Password Health Best Practice Cost Management Employer-Employee Relationship Google Drive Social Windows 10 Government IT Services Politics Automation Shortcut Two-factor Authentication Streaming Media Work/Life Balance Alert Facebook Bandwidth Managed IT Services Computers User Error Current Events Office tips Managed IT Upgrade Proactive IT Hacking USB Artificial Intelligence Antivirus Data Management Blockchain Save Money Spam Sports Patch Management Identity Theft Managed Service Provider Encryption Office Maintenance Router History eWaste Business Intelligence Mobile Computing DDoS Gmail Cleaning End of Support Battery WiFi Tech Support Samsung OneNote Storage Private Cloud Transportation Excel Networking Compliance Internet Exlporer Wireless Technology Touchscreen iPhone Managing Stress The Internet of Things Devices HaaS Cortana Television Hosted Solution Audit Marketing Save Time Automobile Company Culture Personal Information Commerce VPN SaaS Google Docs Legal Social Engineering Wireless Charging Telephony Humor Computer Care Analytics Search Fraud Data Storage Meetings Remote Computing Flexibility Going Green Mobile Security Data Protection Apple Information Recovery Upgrades Screen Mirroring Specifications Bring Your Own Device Applications Google Assistant GDPR File Sharing Language Scalability Outlook Evernote PDF Worker Commute Identity Managed Service Avoiding Downtime Ciminal Books Connectivity Authorization Chromecast IT solutions IT Management Websites Amazon Windows Ink Files Consultant Cast Sales Instant Messaging Hybrid Cloud Scam Nanotechnology Licensing Device Security Experience Running Cable Value Dark Web How To SharePoint Unified Communications Hiring/Firing iOS Text Messaging Data Privacy Google Maps Project Management Bluetooth Distributed Denial of Service Downloads Windows 10s IT Solutions FAQ Point of Sale Data Theft Virtual Assistant Laptop Training Error BYOD Retail Managed IT Service Employer Employee Relationship Root Cause Analysis Travel Phone System RAM Robot Benefits Sync Workers Hard Drive Data Loss IT budget Video Games Fax Server Trends Troubleshooting Solid State Drive Charger Advertising Computing Plug-In Touchpad Settings Music Internet Explorer Microsoft Office 365 Trending Electronic Medical Records Conferencing Cables Data storage Computer Accessories Augmented Reality Tablets Spyware Legislation Reputation Teamwork Microsoft Teams Lithium-ion battery Smart Technology Computer Fan Updates Chromebook Reporting A.I. Administrator Hacker Hard Disk Drive WIndows Server 2008 App store Remote Monitoring and Management Threat Access Control Safety Emails HBO Gifts Virtual Reality Virus Voice over Internet Protocol NFL Unified Threat Management Comparison Black Market G Suite WannaCry Adobe Microsoft Word Entertainment Wearable Technology Printing Medical IT Microsoft Excel Identities Movies Access Keyboard Data Breach Analysis Uninterrupted Power Supply Operating Sysytem Big Data PowerPoint Authentication Budget Webinar Credit Cards Education Proactive Vendor Management Word Edge Monitors Relocation Printers Worker Twitter Regulation Disaster Cache Remote Monitoring Emergency CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login