MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call MERIT Solutions at (757) 420-5150 for more information. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup google Business Management Managed IT Services Productivity Computer Disaster Recovery Microsoft IT Support Outsourced IT communications Mobile Devices Business Continuity VoIP Business User Tips Windows 10 Email Productivity IT Services Hardware Innovation Cybercrime Small Business Windows Efficiency Managed IT Server Mobile Device Management Data Backup Mobility Apps Smartphone Ransomware Cybersecurity browser Data Recovery Operating System Saving Money Internet of Things Save Money Telephone Systems Hosted Solution Quick Tips Android Virtualization Law Enforcement Passwords Holiday Office 365 Microsoft Office BYOD Chrome Data BDR Money Phishing VPN Information Technology Recovery Data Security Password IT Support Social upgrade Google Drive Hacking Avoiding Downtime Automation Wireless Alert Health App Communication Miscellaneous Managed Service Provider Vulnerability Risk Management Computers Unsupported Software Cloud Computing Facebook Government Social Media Best Practice Work/Life Balance Budget Smartphones Wi-Fi Update Data Management Gadgets Current Events Audit Collaboration Social Engineering Personal Information Wireless Technology Politics Two-factor Authentication Telephony Windows 10 search USB Save Time Spam Office tips Applications Private Cloud History Identity Theft User Error Managed IT Services Proactive IT Data Breach Flexibility Shortcut The Internet of Things Firewall Application Workplace Tips Antivirus DDoS Content Filtering Network Sports Battery HaaS Tech Support Data Protection Hacker Television Compliance Solid State Drive Internet Exlporer Redundancy Apple Automobile Blockchain Streaming Media Commerce WiFi iPhone Saving Time Cortana Mobile Computing Patch Management Going Green Cleaning Bandwidth Transportation Office Computer Care Phone System eWaste Robot Legal Excel Fraud Users Encryption End of Support Remote Computing Tech Term Data Storage Artificial Intelligence OneNote Gmail Cost Management Humor Disaster Project Management Data Loss SaaS Marketing Employer-Employee Relationship IT solutions Google Docs Samsung Conferencing Unified Threat Management HBO Webinar Microsoft Word Mobile intranet WSJ Colocation Training Hard Drives Entertainment Exchange Microsoft Excel Gifts Upgrades Distributed Denial of Service Electronic Medical Records IT solutions altivista Files Point of Sale Administrator Lithium-ion battery Professional Services IT budget Company Culture HIPAA SBS File Sharing Consultant IT Management Maintenance Windows 10s compaq Black Market Relocation Access Travel Smart Technology Nanotechnology Value Wearable Technology Avoid Downtime Storage Credit Cards WIndows Server 2008 Device Security Hard Disk Drive hp Shadow IT Document Management Tablets Identities Root Cause Analysis PDF Experience domain FAQ Devices NFL IoT Augmented Reality Business Intelligence Text Messaging Touchscreen remote Video Games Lifestyle Charger Outlook Spyware Yahoo Virtual Reality Word Language Scam Managed IT Service Running Cable Music Server 2008 Legislation Wireless Charging iOS Ali Rowghani Windows Ink Trending Employer Employee Relationship Analytics Laptop Uninterrupted Power Supply Comparison Evernote Regulation Edge Keyboard Computer Fan Instant Messaging Worker Commute Google Maps Virus Computer Accessories Mobile Device Screen Mirroring Big Data server installation dvd "cannot install required files" Touchpad Specifications Networking Sync Ciminal Dark Web stock Reputation Managing Stress Advertising Software as a Service Proactive Meetings Cast Books Emails Scalability Sales Workers Adobe Hiring/Firing tweet Education Data storage Router Websites Vendor Management Settings Retail calculator How To Chromecast Updates Licensing MSP Benefits WannaCry Twitter Administration control Monitors Remote Monitoring Safety Emergency Worker CrashOverride Thank You Congratulations Cache Data Theft

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...