MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call MERIT Solutions at (757) 420-5150 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Managed IT Services Computer Microsoft Mobile Devices Outsourced IT Disaster Recovery Business communications VoIP Business Continuity Windows 10 IT Support Hardware Innovation Cybersecurity Email User Tips IT Services Data Backup Efficiency Cybercrime Mobile Device Management Tech Term Windows Managed IT Small Business Data Recovery Apps Server Ransomware Mobility Saving Money browser Data Smartphone Law Enforcement Internet of Things Operating System Productivity Telephone Systems Android Virtualization BDR Office 365 Save Money Smartphones Hosted Solution Passwords Quick Tips Cloud Computing Phishing Money Data Security Recovery VPN Microsoft Office Password Holiday BYOD Automation Managed Service Provider Chrome Communication Information Technology Data Management Facebook Government Network Risk Management Unsupported Software Collaboration IT Support Update Gadgets Google Drive Hacking Avoiding Downtime Work/Life Balance Cost Management Alert Wi-Fi Health Vulnerability Miscellaneous Application Computers upgrade Social App Data Breach Best Practice Social Media Two-factor Authentication Budget Wireless USB User Error Cleaning Employer-Employee Relationship Save Time Data Protection Gmail Tech Support Identity Theft Wireless Technology Artificial Intelligence Workplace Tips Flexibility Shortcut Telephony Firewall Social Engineering Spam Antivirus Streaming Media Current Events Audit Applications Private Cloud Office tips History Managed IT Services Remote Computing Compliance search Proactive IT Personal Information Politics The Internet of Things Google Docs Office Fraud Computer Care Phone System Sports Legal Encryption Users Redundancy Hacker Internet Exlporer Solid State Drive Commerce IT solutions Project Management Big Data DDoS Cortana iPhone Patch Management Windows 10 Education Vendor Management Television Mobile Computing Router SaaS Transportation Samsung Apple Wireless Charging Excel Content Filtering Robot Battery Data Storage Management HaaS WiFi Blockchain End of Support OneNote Going Green Bandwidth Automobile eWaste Mobile Security Value Devices Data Loss Humor Disaster Saving Time Marketing Google Assistant WannaCry Language Updates Licensing Data storage Data Privacy Conferencing Administration HBO Chromecast Webinar Computer Forensics Video Games Virtual Reality server installation dvd "cannot install required files" Microsoft Word Mobile Microsoft Excel Scam Remote Monitoring Hard Drive stock Edge Gifts Colocation Music IT solutions PowerPoint Virus Hard Drives Professional Services File Sharing Employer Employee Relationship Files Chromebook tweet Lithium-ion battery Ciminal IT Management Analytics Administrator Windows 10s Wireless Internet Nanotechnology Instant Messaging Proactive calculator Travel Keyboard Storage Computer Accessories Worker Commute Smart Tech Twitter control Credit Cards Mobile Device Relocation WIndows Server 2008 Access Hard Disk Drive Gamification Root Cause Analysis Managing Stress Websites Tablets Connectivity WSJ MSP Exchange FAQ Books Memory Scalability Augmented Reality Distributed Denial of Service Data Theft altivista PDF NFL Hiring/Firing Lifestyle Business Intelligence Touchscreen Content Filter intranet SBS Charger Outlook Students How To Benefits Computing compaq Text Messaging Word Legislation Managed IT Service Monitoring Wearable Technology IT budget Unified Threat Management iOS Unified Communications Analysis hp Windows Ink Comparison Training Entertainment Maintenance domain Evernote Upgrades Regulation Electronic Medical Records Computer Fan Financial Laptop Point of Sale Uninterrupted Power Supply App store Google Maps Specifications Company Culture Screen Mirroring HIPAA Financial Technology Device Security Black Market Identities remote Networking Consultant Sync Safety Dark Web Smart Technology Touchpad Meetings Yahoo Software as a Service Sales Reputation Cast Emails Printing Avoid Downtime Shadow IT Running Cable IoT Server 2008 Workers Advertising Adobe Settings Document Management Identity Ali Rowghani Retail Experience Trending Spyware Cache Monitors Worker Thank You Congratulations CrashOverride Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...