MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Employees Can Be One Of Your Biggest Security Risks

Your Employees Can Be One Of Your Biggest Security Risks

A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when they receive a suspicious email in their inbox, or if they are accessing data that they simply have no business accessing in the first place. Sometimes businesses will even completely forget to remove employee credentials when they leave a project or the company creating a breachable hole in your network. Regardless of the reason, user error can be a detrimental occurrence, and one which must be prepared for.

Restrict User Permissions
You may notice that every time you try to download an application to your computer, it requests specific permissions from the user. If it were your personal computer, you could just click OK without thinking twice. However, this isn’t your personal computer--it’s your office workstation. If you let your employees download whatever apps they want to their devices, who knows what kind of nonsense you’ll find on them? They could accidentally download malware or install something to give hackers remote access.

This is why you limit what your users can do on their workstations. The only users who should have administrative access to your company’s devices are your network administrator and any IT technicians you employ, as they will be the ones primarily installing new software on your devices.

Minimize Data Access
If you give your entire staff access to every little part of your data infrastructure, they are bound to run into data that’s not meant for their eyes. For example, an employee might gain access to your business’ payroll, which could cause unnecessary friction. They also might find other sensitive information that they aren’t supposed to see, like personal information or financial details.

The best way to keep this from happening is to partition off your infrastructure so that employees can only access information that they need to do their jobs. Just ask your IT provider about your access control options.

Remove Employee Credentials
What happens when an employee leaves your organization, but is still able to access their email, your network, and their workstation? You could run into an employee sabotaging your organization. This isn’t something that you want to deal with, and the easiest way to make sure it doesn’t happen is to begin the process of removing this employee from their accounts before they leave.

Passwords need to be changed so that the employee cannot access your infrastructure any longer. You don’t want to delete the accounts entirely, though. You might want to check through the accounts, particularly because you might find reasons why they have chosen to leave your organization.

Can your business keep itself safe from user error and other threats? MERIT Solutions can help you keep the negative results of user error to minimum. To learn more, reach out to us at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup Business Management Managed IT Services google Productivity Microsoft Disaster Recovery Computer Outsourced IT Business Continuity Business communications Mobile Devices IT Support VoIP User Tips Windows 10 IT Services Hardware Innovation Productivity Email Cybercrime Mobile Device Management Mobility Windows Managed IT Data Backup Small Business Server Efficiency Smartphone Cybersecurity browser Apps Ransomware Data Recovery Internet of Things Save Money Operating System Saving Money Telephone Systems Law Enforcement Hosted Solution Quick Tips Passwords Android Virtualization Chrome Information Technology Recovery Phishing VPN Microsoft Office Office 365 Data Security BYOD Password Data Holiday BDR Money Risk Management upgrade Social Unsupported Software Cloud Computing Best Practice Social Media App Communication Work/Life Balance Vulnerability Budget Smartphones Data Management Wi-Fi Facebook Government Update Google Drive Hacking Gadgets Avoiding Downtime Automation Alert Wireless Health Miscellaneous Managed Service Provider Computers IT Support History Identity Theft Proactive IT search Windows 10 Flexibility The Internet of Things Shortcut Spam User Error Firewall Managed IT Services Application Antivirus Current Events Data Breach Audit Wireless Technology Personal Information Workplace Tips Politics Two-factor Authentication Telephony USB Save Time Social Engineering Collaboration Applications Private Cloud Office tips Redundancy Legal End of Support Remote Computing Commerce Users WiFi Encryption Going Green Project Management Bandwidth Cortana Artificial Intelligence Patch Management eWaste Humor Disaster Cost Management Employer-Employee Relationship Excel SaaS Data Storage Network Sports Samsung Tech Support Content Filtering OneNote Blockchain Gmail Battery HaaS Hacker Internet Exlporer Solid State Drive Compliance IT solutions Data Loss Automobile Marketing DDoS iPhone Google Docs Mobile Computing Saving Time Transportation Fraud Television Cleaning Tech Term Data Protection Office Computer Care Phone System Robot Streaming Media Apple Virus IT Management Windows 10s Scam Wearable Technology Music hp Travel Nanotechnology Ciminal Laptop Uninterrupted Power Supply Storage Credit Cards domain Proactive WIndows Server 2008 Hard Disk Drive Employer Employee Relationship Analytics Tablets Root Cause Analysis Touchpad Keyboard Instant Messaging Worker Commute FAQ remote Websites Reputation Computer Accessories Mobile Device Big Data Yahoo NFL Advertising Augmented Reality MSP Business Intelligence Touchscreen Managing Stress Lifestyle Running Cable Charger Server 2008 Outlook Books Ali Rowghani Scalability Word Data storage intranet Managed IT Service Trending Hiring/Firing Education Legislation Wireless Charging Router Administration iOS Chromecast Vendor Management How To Windows Ink IT budget Benefits Comparison Evernote server installation dvd "cannot install required files" Regulation Colocation Computer Fan Unified Threat Management stock Google Maps Hard Drives Maintenance Specifications Screen Mirroring Files Lithium-ion battery Entertainment Networking Sync Dark Web Administrator Training Meetings Upgrades Electronic Medical Records tweet Software as a Service Device Security Sales Identities Cast Emails Point of Sale Company Culture HIPAA Workers calculator Adobe Relocation Access Settings Consultant Twitter Black Market Devices Retail control IoT Smart Technology Value Updates Avoid Downtime Licensing WannaCry WSJ Shadow IT PDF Spyware Document Management Conferencing Exchange Language HBO Webinar Distributed Denial of Service Experience Microsoft Word altivista Mobile Microsoft Excel Text Messaging Gifts SBS IT solutions compaq Video Games Professional Services Edge Virtual Reality File Sharing Data Theft CrashOverride Thank You Congratulations Safety Cache Emergency Monitors Remote Monitoring Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...