Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call SMART Services at 586 258-0650 for more information.

Two-Factor Authentication Frequently Asked Questio...
Tip of the Week: Did You Know Your Computer Can Do...

Comments 2

Santillan Linda on Saturday, 31 March 2018 07:14

Blogs aren't only for socializing with others but it may additionally give us useful facts like this.Thank you for sharing informative blog with us.

Blogs aren't only for socializing with others but it may additionally give us useful facts like this.Thank you for sharing informative blog with us.
ollab ollabycapo on Tuesday, 24 July 2018 16:04

Never lazy or careless regarding the company information.The australian reviewer helps the people know about how the interner make more secured and save.

Never lazy or careless regarding the company information.The [url=""]australian reviewer[/url] helps the people know about how the interner make more secured and save.
Already Registered? Login Here
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Employer-Employee Relationship Shortcut Cybersecurity WPA3 Social ebay Network Document Management Windows 7 Apple Access Instant Messaging Mobile Computing Smartphone Computer repair VoIP Tablet Windows Ink Specifications email encryption Financial Technology Help Desk Projects PowerPoint Scott White The Internet of Things Recovery Jessica Stevenson iOS Extreme Technology Makeover Online Currency MAIA Branding IT Support Domains Management Consultant Managing Stress Text Messaging Project Management Business Intelligence Windows 10 Virtual Desktop Email Personal Information Managed IT Services IT Solutions DocStar SharePoint Payroll Uninterrupted Power Supply hacker Saving Time Shadow IT Sales Wayne Joubert Tip of the Week Identity Office Tips Private Cloud Root Cause Analysis Fraud Miscellaneous Wearable Technology User Error Computer Care Take Your Agency to the Next Level Programming Internet Microsoft Excel SMARTweb Defense Bloatware Microsoft Office Browser Employee Phone System webinar Software as a Service Social Networking HITECH Act DDoS FAQ Avoid Downtime Outlook Printers Identity Theft GLAD Quick Tips Telephone Trending Mobility Vendor Management User Tips Data Gift Giving Microsoft Windows 7 Connectivity automation Maintenance 3D Printing Keyboard Shortcuts social media Windows 8 Proactive IT Virtual Assistant Wasting Money Best Practice Office 365 BYOD Google Maps Access Control malware PDF Hard Drive Charger holidays Risk Management Sync CrashOverride OneDrive Politics SMB Content Filter Augmented Reality Prodcutivity Google Adobe Buisness Innovation End of Support eWaste Wasting Time Language Cleaning Tech Term Google Docs Vendor Devices ISP BDR Upgrade History Unsupported Software WannaCry Hybrid Cloud Emails Best Practices Video Games Wireless Technology Conferencing Operating System Disaster Recovery Microsoft Outlook 2007 Images Business Edge Camera Cybercrime Gamification iPhone Business Management IT Support Backup and Disaster Recovery MSP Evernote Legislation Television Search Phishing Alert Co-managed IT Computer Forensics Admin OneNote Screen Mirroring Payment Cards WIndows 7 Microsoft Word WIndows Server 2008 Audit Excel robot Printer Server HBO Apps Network Congestion Avoiding Downtime Efficiency Printing Gmail Hacking Cameras Scalability Comparison Work/Life Balance Redundancy Mouse Microsoft Outlook Data Recovery Books Android Managed Service Provider Hosted Solutions Scam Analytics Updates Productivity Data Protection IT Consultant Tutorial Applied TAM Debate Hiring/Firing Managed Service Commerce Websites Administrator Facebook Router Music Encryption Identities Firewall Microsoft Office 2010 Ciminal Machine Learning Nokia Employee-Employer Relationship How To Outsourced IT Compliance Emergency insurance Productivity Ransomware Safety Smart Technology Chrome Save Money Budget Tablets Workers IT consulting Small Business Hetrick and Associates Content Filtering Monitoring Internet of Things User Co-Managed Services Applications data backups communications Money Meetings Chromebook Web Design Webinar Internet Exlporer Windows 10 Distributed Denial of Service Cloud Computing Display Update Wireless Security Smart Tech Twitter Remote Monitoring Analysis IT solutions Congratulations Net Neutrality Peripheral Tech Support Customer Service Unified Threat Management Reliable Computing press release Social Engineering Running Cable Vulnerability Mobile Device Management Business Technology Downtime Experience video Bring Your Own Device Health Government In the News Ubuntu Kleinschmidt Insurance Proactive Benefits Holiday iPad Data Loss Touchscreen Mobile Office Administration Advertising File Sharing Managed IT Upgrades Backkup Data Privacy Business Continuity Marketing Information Technology Antivirus Software Data Storage Blogging Law Enforcement Passwords Intranet Cast Black Market Back Up Google Drive Application Printer Humor Cloud hackers NFL Two-factor Authentication Thank You Remote Computing Networking Worker Commute lunch and learn Virtual Private Network Wi-Fi Users Battery Regulation Licensing Collaboration Telephony Spyware Save Time Automobile Professional Services Samsung Electronic Medical Records Video Surveillance Privacy Employer Employee Relationship HaaS Disaster Laptop Communication Company Culture Flexibility Surge Protector Phishing Scam Testing Jerry Fetty Security Cameras Lithium-ion battery IT Management Mobile Bluetooth App store Wireless Internet Smartphones Managed IT Services Wireless Charging Data Theft Gifts Work Station Server Information App Steve Anderson Gadgets Hosted Solution Colocation IoT Hard Disk Drive Doug Vanni Technology IT Service IT Services Cortana Solid State Drive Education Hardware Data Security Virtualization Fax Server Alexa for Business Data Backup Virtual Reality Patch Management spam USB Telephone Systems Files Entertainment Travel Backup Bryant Caudill Current Events Data Management Medical IT Wiring agency automation Computer Password Point of Sale Utility Computing Windows Computer Fan Value Computing SMART Services Computer Accessories Students Financial Taxes Near Field Communication Science IT Budget Accessory Training Mircrosoft Best Available Touchpad Regulations Going Green Saving Money Supercomputer website Paperless Office Network Security Youtube Dark Web Managed IT Service Lifestyle Cost Management Fun VPN Bandwidth Hyperlink Streaming Media WiFi HIPAA Nanotechnology Memory Google Assistant Microsoft Operating Sysytem IIAI File Storage Reputation Unified Communications Amazon Customer Relationship Management Settings E-Commerce Presentation Sports Office Credit Cards Mobile Security Retail Virus MySalesResults Storage Artificial Intelligence Blockchain Biometrics Remote Workers Mobile Devices Inbound Marketing Word Mobile Device IT Technicians Microblogging Workplace Tips Legal Keyboard Data Breach Break/Fix Media Consumption Tech Tip Chromecast Device Security Transportation SaaS Hard Drives Human Resources Windows 10s Computers Chevy HHR Big Data Teamwork Business Computing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *