croom new

Eclipse Integrated Systems Blog

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call Eclipse Integrated Systems at 800-340-0505 for more information.

Credit Card Theft and Identity Theft are Not the S...
Tip of the Week: Did You Know Your Computer Can Do...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google Hackers User Tips Malware Productivity Software Business Management Microsoft Tech Term Innovation Hosted Solutions Efficiency Computer Backup Windows 10 Browser Email Business Cybersecurity Apps Mobile Devices Smartphones Productivity Managed IT Services Saving Money Data Recovery Hardware Communication Smartphone Internet of Things Small Business Windows Data Backup Android Collaboration Virtualization Cybercrime Holiday VoIP Microsoft Office Business Continuity Law Enforcement Network Operating System Passwords Mobile Device IT Support Wireless Disaster Recovery Ransomware Workplace Tips communications Mobility IT Support Data Miscellaneous IT Services Cloud Computing Users Data Security Social Media Windows 10 Mobile Device Management Telephone Systems Wi-Fi Office 365 BDR Chrome Quick Tips Server Outsourced IT Gadgets Money Phishing Update Password Best Practice Government Google Drive Vulnerability Unsupported Software Social Health Risk Management Application Information Technology App Cost Management Upgrade Employer-Employee Relationship Work/Life Balance Blockchain Facebook Managed Service Provider Data Management Save Money Office tips Current Events Patch Management Shortcut Sports USB Artificial Intelligence Antivirus Streaming Media Two-factor Authentication Bandwidth Automation Managed IT Services Networking User Error Information Marketing Identity Theft Managed IT Alert Politics Computers Proactive IT Spam Hacking Google Docs Private Cloud Meetings Wireless Charging Fraud VPN Going Green Social Engineering HaaS Data Storage Telephony Humor iPhone Apple Managing Stress Office Automobile Word Remote Computing eWaste Data Protection Applications Maintenance Cleaning Mobile Computing Personal Information DDoS Samsung OneNote WiFi Remote Monitoring and Management Recovery Outlook Access Control Legal Medical IT Analytics Training Search Touchscreen Gmail Mobile Security Storage Tech Support Excel Audit Flexibility Television Devices Save Time Transportation BYOD Company Culture Managed Service Router Cortana Internet Exlporer Business Intelligence Encryption The Internet of Things Connectivity History SaaS Commerce Wireless Technology End of Support Battery Hosted Solution Computer Care Compliance Data Theft Virtual Assistant Text Messaging Wearable Technology WannaCry Data storage Downloads How To WIndows Server 2008 Unified Threat Management Trending Managed IT Service Point of Sale NFL Keyboard Lithium-ion battery Error HBO Gifts Adobe Microsoft Word Webinar Administrator Hard Drive Phone System Comparison Vendor Management RAM Certification Computing Plug-In Microsoft Excel Identities Trends Troubleshooting Data Breach Upgrades Cables Advertising Edge Internet Explorer Microsoft Office 365 Video Games Credit Cards IT solutions Access Chromebook Reporting Music Screen Mirroring Specifications Uninterrupted Power Supply Operating Sysytem Microsoft Teams Security Cameras Consultant Budget App store Running Cable File Sharing Language Scam Nanotechnology A.I. Profitability Reputation Evernote Virus Voice over Internet Protocol Windows Ink Ciminal Hiring/Firing iOS Threat SharePoint IT Management Virtual Reality Licensing Device Security Windows 10s Printing Bluetooth Distributed Denial of Service Cast Sales Avoiding Downtime G Suite Wearables Chromecast Analysis Entertainment Employer Employee Relationship Root Cause Analysis Movies Eliminating Downtime Black Market Proactive Google Maps Project Management Benefits PowerPoint Authentication IT Solutions FAQ Files Education Travel Solid State Drive Google Assistant GDPR Fax Server Big Data Retail Settings Bring Your Own Device Sync Workers Electronic Medical Records Identity Computer Accessories Augmented Reality Laptop Wireless Internet Websites Amazon PDF Worker Commute Data Loss IT budget Smart Technology Computer Fan Authorization Healthcare Teamwork Scalability Charger Tablets Spyware Hacker Hard Disk Drive Robot Value Dark Web Books Conferencing Hybrid Cloud Updates Safety Emails Data Privacy Experience Legislation Touchpad Unified Communications Help Desk Instant Messaging Printers Twitter Remote Monitoring Emergency Regulation CrashOverride Monitors Worker Cache Disaster Relocation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login