SMART Blog

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call SMART Services at 586 258-0650 for more information.

 

Comments 2

Santillan Linda on Saturday, 31 March 2018 07:14

Blogs aren't only for socializing with others but it may additionally give us useful facts like this.Thank you for sharing informative blog with us.http://www.triumphessays.com/

Blogs aren't only for socializing with others but it may additionally give us useful facts like this.Thank you for sharing informative blog with us.http://www.triumphessays.com/
ollab ollabycapo on Tuesday, 24 July 2018 16:04

Never lazy or careless regarding the company information.The australian reviewer helps the people know about how the interner make more secured and save.

Never lazy or careless regarding the company information.The [url="https://australianreviewer.com/top-nsw-assignment-writing-services/"]australian reviewer[/url] helps the people know about how the interner make more secured and save.
Guest
Already Registered? Login Here
Guest
Saturday, January 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Information Technology Hybrid Cloud FAQ Holiday Video Surveillance Tablet Managed Service IT solutions Licensing iPad Excel SMB Device Security User Error Online Currency IT Solutions Financial hacker Customer Service IT Consultant Administrator Electronic Medical Records Search Camera IT consulting Unified Communications ebay SMART Services Google Social Engineering Fraud Text Messaging Avoiding Downtime Telephone Systems Unsupported Software IT Budget Mobile Security HBO Hyperlink Scott White Wireless Charging Keyboard Phishing Scam Best Practices Microsoft Office 2010 Politics Training IT Technicians Co-Managed Services Consultant Sports Antivirus Testing Computer Fan End of Support Cast Proactive IT HIPAA Project Management Social Email Analytics automation MAIA Information Vulnerability Technology Books Chevy HHR Microsoft Excel data backups WiFi Privacy Outlook Utility Computing Nanotechnology Data Computer Forensics video Identity Theft Best Available Smartphones Managed Service Provider HaaS Business Technology MSP Updates Tech Support Remote Computing Inbound Marketing Wasting Time Supercomputer Emails Big Data Software as a Service insurance Private Cloud Small Business Blockchain Applied TAM Point of Sale Windows 8 PDF Upgrades Operating System Files Experience Phone System Two-factor Authentication Intranet Legislation Disaster Recovery Education Surge Protector Value Regulation Virtual Reality Google Maps Network Congestion SMARTweb Defense Content Filter Network Security Hard Drives Work Station OneNote Data Recovery Microsoft Office Trending iOS email encryption IIAI PowerPoint Virtual Private Network Health Applications press release Scalability Help Desk Document Management Risk Management Alexa for Business Adobe Chrome Browser Proactive SharePoint Employee-Employer Relationship Gift Giving Dark Web ISP Identity Save Money WIndows Server 2008 Recovery Virtualization Biometrics Peripheral Net Neutrality Hetrick and Associates Security Cameras Buisness IT Service Tech Term Mouse Wiring Ciminal Music Shadow IT History Chromebook Advertising Laptop Payroll IT Services Best Practice Productivity Take Your Agency to the Next Level Alert Gamification Google Docs Cortana Saving Money Business Access Control Apps Wayne Joubert Encryption Cloud Analysis Solid State Drive lunch and learn Microsoft Identities Virus Patch Management Vendor Worker Commute Cybercrime Tutorial Server Internet Exlporer Television Hiring/Firing Humor website Communication Data Storage Mobile Device Management Fun Computer VoIP agency automation Debate Windows 10 Cybersecurity Printer Security Tech Tip Collaboration Employer-Employee Relationship Hacking Screen Mirroring Language Data Theft Cameras Conferencing spam Update Reputation USB Projects Back Up Access Black Market Mobile Device Telephony Compliance Lithium-ion battery Augmented Reality Managed IT Settings Data Security webinar Data Management Firewall Microblogging Prodcutivity Smartphone Data Privacy Teamwork Bluetooth Ubuntu Hard Drive Hosted Solutions Fax Server Business Continuity User Tips Websites Operating Sysytem Printer Server OneDrive WPA3 Smart Tech Management Display VPN Saving Time Tablets Edge Mobile Computing Windows Backkup Microsoft Word Facebook Flexibility Business Computing DocStar malware Marketing Twitter Managing Stress Steve Anderson Workplace Tips Safety Windows 7 Entertainment Microsoft Windows 7 Reliable Computing Storage Application Science Computer repair WIndows 7 Gifts Money MySalesResults Cloud Computing Mobile Office Customer Relationship Management Office 365 Bring Your Own Device Accessory Downtime Root Cause Analysis IT Management Computer Care How To Users Phishing Artificial Intelligence Sync Wasting Money Running Cable Hard Disk Drive Evernote Workers Nokia IT Support Vendor Management BYOD Images Ransomware Jerry Fetty Quick Tips Business Management hackers CrashOverride Outsourced IT Distributed Denial of Service Devices Scam Computing Word Save Time Wireless Google Assistant Unified Threat Management Productivity Doug Vanni Bandwidth Touchpad User Amazon Hosted Solution Sales Going Green Office Tips Maintenance iPhone Specifications File Sharing Transportation Gadgets social media Shortcut Wireless Internet Office Admin Law Enforcement Virtual Assistant Innovation Branding Regulations Near Field Communication Wi-Fi Emergency Android Windows 10s Monitoring In the News Charger Chromecast Telephone Automobile Streaming Media Cleaning Students Microsoft Outlook Current Events Internet Managed IT Service 3D Printing Touchscreen Printing Microsoft Outlook 2007 Video Games Lifestyle Kleinschmidt Insurance Audit IT Support Government Managed IT Services Presentation Budget NFL Financial Technology Smart Technology Content Filtering Apple Programming GLAD Domains Managed IT Services Miscellaneous Benefits Backup Mircrosoft App communications Instant Messaging Upgrade Thank You Network Taxes Data Loss SaaS Windows 10 Business Intelligence Colocation Commerce Legal Retail Company Culture BDR Machine Learning Disaster Remote Workers Software Memory Keyboard Shortcuts Windows Ink Google Drive Human Resources Mobility Cost Management Media Consumption App store Congratulations Data Protection Networking Password Efficiency Wearable Technology Blogging File Storage Computers Virtual Desktop Bloatware Webinar Data Backup Co-managed IT Mobile Uninterrupted Power Supply Printers holidays Internet of Things robot Passwords Administration Tip of the Week Comparison Computer Accessories IoT WannaCry Spyware eWaste Web Design Wireless Technology Meetings DDoS Hardware HITECH Act The Internet of Things Avoid Downtime Personal Information Social Networking Battery Bryant Caudill Paperless Office Jessica Stevenson Youtube Redundancy Credit Cards Remote Monitoring Mobile Devices Work/Life Balance Employer Employee Relationship Data Breach Connectivity Gmail Extreme Technology Makeover Samsung Professional Services Router Travel

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *