MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Employees Can Be One Of Your Biggest Security Risks

Your Employees Can Be One Of Your Biggest Security Risks

A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when they receive a suspicious email in their inbox, or if they are accessing data that they simply have no business accessing in the first place. Sometimes businesses will even completely forget to remove employee credentials when they leave a project or the company creating a breachable hole in your network. Regardless of the reason, user error can be a detrimental occurrence, and one which must be prepared for.

Restrict User Permissions
You may notice that every time you try to download an application to your computer, it requests specific permissions from the user. If it were your personal computer, you could just click OK without thinking twice. However, this isn’t your personal computer--it’s your office workstation. If you let your employees download whatever apps they want to their devices, who knows what kind of nonsense you’ll find on them? They could accidentally download malware or install something to give hackers remote access.

This is why you limit what your users can do on their workstations. The only users who should have administrative access to your company’s devices are your network administrator and any IT technicians you employ, as they will be the ones primarily installing new software on your devices.

Minimize Data Access
If you give your entire staff access to every little part of your data infrastructure, they are bound to run into data that’s not meant for their eyes. For example, an employee might gain access to your business’ payroll, which could cause unnecessary friction. They also might find other sensitive information that they aren’t supposed to see, like personal information or financial details.

The best way to keep this from happening is to partition off your infrastructure so that employees can only access information that they need to do their jobs. Just ask your IT provider about your access control options.

Remove Employee Credentials
What happens when an employee leaves your organization, but is still able to access their email, your network, and their workstation? You could run into an employee sabotaging your organization. This isn’t something that you want to deal with, and the easiest way to make sure it doesn’t happen is to begin the process of removing this employee from their accounts before they leave.

Passwords need to be changed so that the employee cannot access your infrastructure any longer. You don’t want to delete the accounts entirely, though. You might want to check through the accounts, particularly because you might find reasons why they have chosen to leave your organization.

Can your business keep itself safe from user error and other threats? MERIT Solutions can help you keep the negative results of user error to minimum. To learn more, reach out to us at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 October 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Best Practices Business Computing Hackers Malware Software Network Security Hosted Solutions Backup Internet google Disaster Recovery Computer Business Continuity Productivity Microsoft Windows 10 Managed IT Services Business IT Support IT Services VoIP Innovation User Tips Hardware Mobile Devices Outsourced IT communications Business Management Windows Mobility Mobile Device Management Ransomware Productivity Efficiency Email Smartphone Managed IT Cybercrime Saving Money Server Telephone Systems Save Money Hosted Solution Cybersecurity Quick Tips Android Operating System Virtualization Law Enforcement Apps Chrome Microsoft Office BYOD Data VPN Data Backup BDR Money Passwords browser Information Technology Password Small Business Recovery Social upgrade Communication Hacking Avoiding Downtime Office 365 Facebook Health Miscellaneous Managed Service Provider Computers Wireless Unsupported Software Budget Data Management Data Recovery Shortcut Work/Life Balance Wi-Fi search App Firewall Application Current Events Google Drive Audit Automation Telephony Alert Government Data Security Private Cloud Office tips Applications USB Proactive IT Save Time Social Media Gadgets Workplace Tips Risk Management Cloud Computing Smartphones Network Cost Management Spam WiFi Phishing Hacker Going Green Internet Exlporer Bandwidth Solid State Drive Wireless Technology Data Storage Managed IT Services Antivirus Samsung Battery iPhone HaaS Mobile Computing Compliance User Error Personal Information Transportation Automobile Politics Robot Gmail History End of Support Remote Computing Saving Time Update Cleaning Office IT solutions Phone System Best Practice Computer Care Internet of Things IT Support DDoS Holiday The Internet of Things Disaster Users Encryption Humor Identity Theft Television Social Engineering Employer-Employee Relationship Windows 10 Streaming Media Apple Flexibility Sports Business Intelligence Touchscreen Wearable Technology Managing Stress hp Colocation Outlook Vulnerability Books Hard Drives Scalability Word Tech Support Files Managed IT Service Hiring/Firing Education domain Router Administrator Excel Lithium-ion battery Vendor Management iOS SaaS How To Windows Ink Benefits remote Yahoo Relocation Access Regulation Computer Fan eWaste Unified Threat Management OneNote Content Filtering Google Maps Screen Mirroring Data Breach Running Cable Server 2008 Entertainment Ali Rowghani Sync Training Dark Web Upgrades Meetings Trending Electronic Medical Records PDF Cast Emails Point of Sale HIPAA Adobe Company Culture Data Loss Consultant Settings Text Messaging Black Market server installation dvd "cannot install required files" Smart Technology Marketing stock Avoid Downtime Licensing Value Google Docs Two-factor Authentication Shadow IT HBO Webinar Document Management Experience tweet Mobile Uninterrupted Power Supply Laptop calculator Data Protection IT solutions Collaboration Twitter Video Games Professional Services Virtual Reality control Touchpad Reputation IT Management Scam Windows 10s Nanotechnology Music WSJ Advertising Legal Travel Commerce Exchange altivista WIndows Server 2008 Employer Employee Relationship Hard Disk Drive Distributed Denial of Service Root Cause Analysis Analytics Data storage Tablets Keyboard Instant Messaging SBS Worker Commute compaq Administration Artificial Intelligence Chromecast Patch Management Computer Accessories Mobile Device Augmented Reality Big Data NFL CrashOverride Software as a Service Safety WannaCry Thank You Cache Emergency Monitors Congratulations Microsoft Excel Remote Monitoring File Sharing Worker Storage

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...