773-635-5100    Let's Meet    Get SUPPORT

Shartega Systems Blog

Shartega Systems has been serving the Chicago area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

As we begin, let’s refer to some stats that were drawn from a Forrester Research study.

  • Insider threats cause 40% of data breaches.
  • 26% of these data breaches are malicious.
  • Accidents and general use cause 56% of these breaches.

Clearly, simple mistakes contribute the most to data breaches. To prepare for these circumstances, let’s examine some of the most common errors made by end users.

Misplacing Devices while Traveling
Most workers have some sort of commute to look forward to as they go to and from the office, and business often requires an employee to travel on behalf of the company. This creates an opportunity, should the employee have a work device with them, for that device to be lost--left at airport security or in the backseat of an Uber--or stolen. Remind your employees how easily such devices can disappear, and that they need to be cognizant of them as they are traveling.

Using Unfamiliar Flash Drives
Flash drives are everywhere these days, which isn’t necessarily a good thing for your business. While many are harmless, the little storage devices can easily be converted into a vehicle for malware. If this is the case, once the USB drive is plugged in, the workstation and quite possibly your entire network could be infected. While this doesn’t mean that flash drives should be forbidden from your office, you should mandate that IT takes a look at them all before they are used.

Letting Devices Connect Willy-Nilly
Chances are almost everybody in your office has a smartphone, along with a laptop and various other devices that all utilize an Internet connection--which means that potential points of access to your network have increased considerably. To counter this, you need to put a Bring Your Own Device (or BYOD) policy in place that protects both your employees and your business. Utilizing a comprehensive mobile device management platform, a BYOD policy will dictate what control you have over user access and data transmission using employee and customer mobile devices.

Being Careless With Company Information
Back in World War II, there was a propaganda campaign by the United States Office of War Information warning citizens against the possibility of providing enemy spies with information: “Loose lips sink ships.” The same can be said of most business operations. Seemingly innocuous choices, like using a personal email account for business purposes, could potentially lead to a data leak. Personal email simply doesn’t have the same protections as business-class email does--and that’s just one example of how your data could be left vulnerable through employee negligence.

If your organization has difficulties with your end users making mistakes, reach out to us for help. Call Shartega Systems at 773-635-5100 for more information.

Credit Card Theft and Identity Theft are Not the S...
Tip of the Week: Did You Know Your Computer Can Do...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Network Security Best Practices Software Technology Hackers Malware Productivity Managed IT Services Business Computing Cloud IT Support Disaster Recovery Outsourced IT Backup Google Internet Mobile Devices Business Continuity Windows 10 Microsoft Data Backup IT Services Managed IT Business Management User Tips Data Recovery Ransomware Mobility Hosted Solutions Email Small Business Communications WIndows Cybersecurity Saving Money Alert Efficiency Business Server VoIP Law Enforcement Office 365 Mobile Device Management Hardware Save Money Smartphone Vulnerability Innovation Phishing Health Social Media Cybercrime Unsupported Software Money Cloud Computing Microsoft Office Hosted Solution Android Browser Avoiding Downtime Miscellaneous Virtualization Google Drive App Shortcut Wireless Politics Computer Office tips Managed Service Provider Government Chrome Facebook Firewall Best Practice Audit Smartphones BYOD Quick Tips Data Security Two-factor Authentication BDR Holiday Data Information Technology Apps Budget Gadgets Collaboration Cleaning iPhone Risk Management Applications Saving Time Identity Theft User Error Proactive IT Search Computer Care Commerce Data Breach Operating System Cortana Passwords Work/Life Balance Google Docs SaaS Wireless Technology Application HaaS Marketing Telephone Systems WiFi Battery Personal Information End of Support Computers Redundancy Data Storage Spam Automobile Cost Management Content Filtering USB Compliance Samsung OneNote The Internet of Things Encryption Data Protection Data Management Social Save Time Software as a Service Humor Settings HIPAA Comparison IT Management Touchscreen Productivity Value Employer-Employee Relationship Users WannaCry Licensing iOS Apple Network PDF Keyboard Specifications IT Solutions Office Evernote Mobile Computer Fan Current Events IT Support Sales Solid State Drive Managed IT Services Networking Professional Services Dark Web Data Loss Text Messaging Automation Wi-Fi Experience Retail Education WIndows Server 2008 Communication Workers Travel Password Hacking Phone System Conferencing Patch Management Emails Hacker Updates Tablets Nanotechnology Microsoft Excel Black Market Business Intelligence Artificial Intelligence Gifts Outlook Webinar Television Microsoft Word NFL Root Cause Analysis File Sharing Shadow IT Managed IT Service Unified Threat Management Point of Sale Excel History IT solutions Mobile Device Reputation Maintenance Word Storage Disaster Router Hard Drives Credit Cards Regulation Windows Ink Flexibility CrashOverride Internet Exlporer eWaste Antivirus Sports Screen Mirroring Upgrades FAQ Sync Avoid Downtime Google Maps Advertising Internet of Things Electronic Medical Records Lifestyle Virtual Reality Cast HBO Consultant Smart Technology Augmented Reality Training Charger Document Management Adobe VPN Update Meetings Emergency Legislation Company Culture Wireless Charging Mobile Computing Supercomputer Competition Spyware Big Data Instant Messaging Fun How To IT Budget Upgrade Video Games Managing Stress Scam Private Cloud Worker Commute Remote Computing Benefits Presentation Employer Employee Relationship Analytics Recovery 5G IBM Computer Accessories Books Legal Transportation Music Customer Relationship Management IP Address Telephony Website Remote Monitoring Customer Service Vendor Management Mobile Office Workplace Tips Domains Windows 10s Public Speaking Hard Disk Drive Scalability Lithium-ion battery Device Security Tech Support Windows 10 Taxes Safety Devices Entertainment Hiring/Firing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *