MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Employees Can Be One Of Your Biggest Security Risks

Your Employees Can Be One Of Your Biggest Security Risks

A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when they receive a suspicious email in their inbox, or if they are accessing data that they simply have no business accessing in the first place. Sometimes businesses will even completely forget to remove employee credentials when they leave a project or the company creating a breachable hole in your network. Regardless of the reason, user error can be a detrimental occurrence, and one which must be prepared for.

Restrict User Permissions
You may notice that every time you try to download an application to your computer, it requests specific permissions from the user. If it were your personal computer, you could just click OK without thinking twice. However, this isn’t your personal computer--it’s your office workstation. If you let your employees download whatever apps they want to their devices, who knows what kind of nonsense you’ll find on them? They could accidentally download malware or install something to give hackers remote access.

This is why you limit what your users can do on their workstations. The only users who should have administrative access to your company’s devices are your network administrator and any IT technicians you employ, as they will be the ones primarily installing new software on your devices.

Minimize Data Access
If you give your entire staff access to every little part of your data infrastructure, they are bound to run into data that’s not meant for their eyes. For example, an employee might gain access to your business’ payroll, which could cause unnecessary friction. They also might find other sensitive information that they aren’t supposed to see, like personal information or financial details.

The best way to keep this from happening is to partition off your infrastructure so that employees can only access information that they need to do their jobs. Just ask your IT provider about your access control options.

Remove Employee Credentials
What happens when an employee leaves your organization, but is still able to access their email, your network, and their workstation? You could run into an employee sabotaging your organization. This isn’t something that you want to deal with, and the easiest way to make sure it doesn’t happen is to begin the process of removing this employee from their accounts before they leave.

Passwords need to be changed so that the employee cannot access your infrastructure any longer. You don’t want to delete the accounts entirely, though. You might want to check through the accounts, particularly because you might find reasons why they have chosen to leave your organization.

Can your business keep itself safe from user error and other threats? MERIT Solutions can help you keep the negative results of user error to minimum. To learn more, reach out to us at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Managed IT Services Business Management Backup Mobile Devices google Computer Outsourced IT Microsoft Business Disaster Recovery Hardware Business Continuity communications VoIP IT Support Windows 10 Innovation IT Services Cybersecurity Email User Tips Data Backup Efficiency Tech Term Cybercrime Windows Saving Money Internet of Things Mobile Device Management Small Business Apps Managed IT Mobility Server Data Recovery Ransomware Operating System Productivity Law Enforcement browser Data Smartphone Money Save Money Telephone Systems Android Virtualization Office 365 BDR Phishing Passwords Smartphones Cloud Computing Data Security Hosted Solution Quick Tips Communication VPN Information Technology Recovery Network Password Holiday Microsoft Office BYOD IT Support Automation Chrome Managed Service Provider Computers Two-factor Authentication Vulnerability Wireless Best Practice Social Media Facebook Government Risk Management Unsupported Software Data Breach Budget Data Management Update Gadgets Workplace Tips Work/Life Balance Cost Management Wi-Fi Google Drive Application Hacking Collaboration Avoiding Downtime Social upgrade Alert Health Miscellaneous App Applications Private Cloud Office tips History Politics Remote Computing Spam Proactive IT User Error Cleaning USB Save Time Managed IT Services The Internet of Things Gmail Users Employer-Employee Relationship Identity Theft Artificial Intelligence Flexibility Tech Support Shortcut Wireless Technology Router Social Engineering Data Protection Blockchain Firewall Antivirus Streaming Media Current Events Telephony Audit Compliance search Personal Information Patch Management Windows 10 Robot Automobile eWaste Fraud Value End of Support Saving Time Wireless Charging Excel Office Data Storage Computer Care Phone System Humor Disaster OneNote Project Management Legal Encryption Networking MSP Sports Data Loss IT solutions Marketing Big Data DDoS Google Docs Hacker Education Internet Exlporer Solid State Drive Vendor Management Management Television SaaS Samsung Apple Redundancy iPhone Content Filtering Battery Travel Mobile Security Commerce Devices WiFi Mobile Computing HaaS Transportation Going Green Bandwidth Cortana Google Assistant FAQ Business Technology Language Consultant Safety remote Black Market Yahoo NFL Data Privacy Augmented Reality Smart Technology Business Intelligence Touchscreen Avoid Downtime Lifestyle Computer Forensics Charger Wasting Money Outlook Running Cable Server 2008 Shadow IT Ali Rowghani Laptop Document Management Uninterrupted Power Supply Word Hard Drive PowerPoint Trending Managed IT Service Edge Experience Legislation Amazon Virus iOS Touchpad Windows Ink Chromebook Wireless Internet Ciminal Reputation Video Games Comparison Virtual Reality Evernote Virtual Assistant Regulation Proactive Computer Fan Advertising server installation dvd "cannot install required files" Scam stock Google Maps Smart Tech Gamification Screen Mirroring Music Specifications Alexa for Business Sync Websites Dark Web Data storage Employer Employee Relationship tweet Software as a Service Connectivity Meetings Memory Cast Emails Administration Analytics Chromecast Sales Instant Messaging Workers Adobe Data Theft Keyboard calculator Computer Accessories Twitter Worker Commute Content Filter Settings Students intranet Mobile Device Colocation control Retail Managing Stress Updates Licensing Computing WannaCry Hard Drives WSJ Files Monitoring Unified Communications HBO IT budget Webinar Books Exchange Administrator Scalability Conferencing Lithium-ion battery Microsoft Word Mobile Analysis Distributed Denial of Service Hiring/Firing altivista Maintenance Microsoft Excel Remote Monitoring Financial IT solutions Relocation SBS Access How To Gifts Professional Services App store Benefits compaq Device Security File Sharing Financial Technology Bring Your Own Device IT Management Identities Unified Threat Management Wearable Technology Windows 10s Nanotechnology PDF hp Training Entertainment Storage Printing Credit Cards Hybrid Cloud WIndows Server 2008 IoT Upgrades Hard Disk Drive Electronic Medical Records domain Point of Sale Tablets Identity Root Cause Analysis Text Messaging Spyware Company Culture HIPAA Emergency CrashOverride Worker Thank You Congratulations Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...