Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call Velocity Technology Partners at (800) - 983 - 5765 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Devices Passwords Google Maps Operating System Gamification Specifications VoIp Computer Networking Workers Application Google Device Security Risk Management Software Holiday Smartphone Hard Drive Antivirus Wi-Fi Connectivity Cleaning Fraud Data Recovery Office 365 User Error Google Assistant Sports Lifestyle Productivity Congratulations Google Drive History Automation Cloud Shortcut Business Malware Software as a Service Edge Audit Smartphones IT Support Telephone Systems BDR Collaboration Screen Mirroring Alert IoT App store Wireless Charging Tech Support Managed Service Provider Unsupported Software Legislation HBO IT budget Best Practice Business Continuity Windows 10 Memory Android Communications Company Culture Storage MSP Internet of Things Internet Artificial Intelligence Value Hosted Solutions IT Management User Tips Politics Patch Management Updates Unified Communications Evernote Tech Term Windows Ink Data Privacy OneNote WIndows Server 2008 Money Spam Two-factor Authentication Mobile Device Management Personal Information Data Backup Tip of the Week Browser Cast Language Microsoft Communication Twitter Cloud Computing Remote Computing Vendor Management Monitoring Identities Smart Tech Gmail Retail Update Safety Law Enforcement Identity Chromebook Content Filtering Social Engineering Network Technology Computer Forensics Charger Emergency Computers Legal File Sharing Travel Microsoft Word Marketing Apple Data Loss Applications Identity Theft Hackers Cybercrime Hosted Solution Vulnerability NFL IT Services Compliance BYOD Analysis Proactive IT Redundancy Hardware Big Data PowerPoint Comparison Outlook Encryption Remote Monitoring Apps Server Data Theft Virtualization Maintenance Printing Spyware Streaming Media Excel Data Security Data Protection Security Wireless Internet Sales Education Ransomware Chrome Network Security Tablets Mobile Devices Telephone Privacy Phishing VPN Email WiFi Ciminal Work/Life Balance Blockchain Credit Cards IT support Word Social Media Managed IT The Internet of Things Wireless Technology Cybersecurity Router Innovation Softphones Managed IT Services Saving Money eWaste Websites Microsoft Excel Outsourced IT Data Cost Management Sync Flexibility Adobe Computing Data Management Government Data Storage iPhone Business Management Licensing Cortana FAQ WannaCry Commerce Proactive Mobile Security Managing Stress Students Gadgets Gifts SaaS Backup intranet Small Business Content Filter Virus Financial Microsoft Office Mobility Thank You Project Management Employer-Employee Relationship Conferencing Windows Management Data Breach IT Solutions App Google Docs Business Computing Disaster Recovery Financial Technology Best Practices Efficiency