Blog
home
  • Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to https://www.4datanet.com/

Do Your Employees Have Any of These Six Hackable Habits?

Do Your Employees Have Any of These Six Hackable Habits?

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

If any of your employees are stuck in the following habits, you have a problem on your hands:

Using Weak Passwords

This is the cardinal sin of anyone who uses a computer. In addition to only using one password for all of their accounts (another big security issue) this one password isn’t sufficiently secure. Too many users will take the easy route, using a pet’s name or some other easily dug-up detail as a password, assuming they don’t make it really easy for a hacker and just use “password” or “12345.” 

You need to make sure that your business’ users do better. Set certain standards that passwords need to live up to, and suggest that your employees try alternatives, like passphrases or a password manager, if remembering multiple complex passwords is a concern.

Sharing Those Weak Passwords

Exacerbating the weak password problem, there can be the temptation among your users to simply share their credentials with their coworkers to simplify workflows. This is far from the ideal situation, as it opens up your business to an increased risk of a data breach.

In fairness, some shared credentials are okay, like those for company social media accounts and other shared, impersonal resources. However, these are the exception to the rule, as they will be managed by the company.

Everyone working in your company needs to understand how their actions could potentially put the company (and, as a result, their jobs) in jeopardy, and that the safeguards you have in place (including password protection) are there to protect the company. 

Using Personal Storage for Company Files

As cloud computing has grown in popularity, it has brought a slew of issues along with its many considerable benefits. One such issue is the tendency for employees to introduce company files to their personal cloud solutions.

Granted, a lot of the time, their intentions are good. It isn’t unheard of that an employee wants to put a little bit of extra time to a project they are working on after hours, so they “take work home with them” in the best way they know how. Unfortunately, this means that they are also taking your data out from behind the protections you have in your business. While it is commendable that they want to accomplish more, they just can’t be allowed to so without the right solution in place to keep your business’ data secure.

Two Words: Shadow IT

Your business’ solutions are likely equipped with exactly the software you want your employees using as they go about their daily responsibilities. However, this may not be the software that your employees are comfortable using - they may not be familiar with it, after all. There’s still a job to be done, though.

This often leads to employees seeking out an alternative solution online and downloading it to their workstation, without first consulting with IT. This program is what is known as shadow IT, a piece of software or hardware that has not been vetted and is still introduced to a system by one of its users.

Shadow IT can cause significant problems, so it is important that your users know that any new software or hardware they would like to use needs to be run past IT first, to ensure there are no issues as a result.

Email Carelessness

Email is a considerably powerful tool for businesses to leverage, making communication far easier and faster than it once was. This doesn’t come without some trade-offs, of course. If an employee isn’t paying attention, they could easily share information with the wrong person - and the same can also be said of file sharing services 

Everyone in your organization - including you, of course - needs to respect the power of the solutions at your fingertips. While working collaboratively has become far easier, it is now much easier to let something leak as well. There needs to be an environment of awareness fostered within your business if you are to protect your investments.

Lack of Training

Speaking of fostering environments, you also need to make sure your employees are properly trained. After all, an employee who has limited-to-no experience with modern cyberthreats is going to be a much easier target than one who knows what to keep an eye out for.

As such, security needs to be a focus at every stage of employment - integral to onboarding and stressed every day. Team discussions about security measures, phishing tests, and other preventative evaluations can help you identify where more training is needed to properly prepare your team for the real deal.

Data Net can help you fix all of these habits. Call us at (760) 466-1200 to learn more about our security solutions.

You Need to Prioritize Metrics that Support Effici...
Tip of the Week: How to Wind Down with Night Mode
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, July 16, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Communication Malware Hackers IT Support Innovation Smartphones Small Business User Tips Communications Google Cloud Hardware VoIp Computer Software Mobile Device Workplace Tips Email Microsoft Users Tech Term Managed IT Services Business Management Android Business Internet Cybersecurity Outsourced IT Hosted Solutions Collaboration Windows 10 Cloud Computing Ransomware Mobile Devices Backup Social Media Miscellaneous IT Services Network Passwords Managed Service Upgrade Apps Smartphone Wi-Fi Data recovery Saving Money Phishing Information Browser Data Backup Wireless Microsoft Office Windows Bandwidth Gadgets Holiday Facebook Applications Networking Internet of Things VPN BDR Managed IT services Patch Management Blockchain Automation Employer-Employee Relationship Access Control Chrome Gmail Quick Tips Marketing Data Breach Apple Save Money Laptop Word Voice over Internet Protocol Conferencing Compliance Router Value Going Green Managed IT Service Business Intelligence Mobile Office Password Business Continuity Connectivity Business Technology Company Culture Disaster Recovery Payment Cards Health Social Network iPhone Paperless Office Cortana Remote Monitoring Remote Work Education Wireless Charging Government Remote Computing Healthcare Net Neutrality Data Management How To Processor Virus Retail G Suite Office Virtual Assistant Virtualization Data Security Telephone System Tech Terms Cost Management Physical Security Mobility Computers Bring Your Own Device Office 365 RAM Server Remote Monitoring and Management Data Protection Batteries Covid-19 Settings Employee-Employer Relationship Excel Twitter Medical IT Telephony Windows 7 Artificial Intelligence Scam Electronic Health Records Vendor e-waste Tip of the week Security Cameras Risk Management Dongle Recovery A.I. Inventory Printer Cables Profitability HIPAA Document Management Antivirus Congratulations Profiles SaaS Voice over IP Time Management Insurance Botnet Remote Working Specifications Customer Service Holidays Machine Learning Tactics Travel Humor Paper File Sharing Millennials Payment Backup and Disaster Recovery Knowledge Battery disposal Wearables Virtual Reality Movies Touchscreen Chrome OS File Management IT Management Mobile Security Website Eliminating Downtime Hard Drive Updates Staff WhatsApp Shadow IT GDPR Managing Stress Lead Generation OneNote Memes Ink instant Messaging Threats Hard Drives Microsoft Office 365 Employees Distribution Server Management Licensing Virtual Private Network Maintenance Plug-In Analytics News Remote Current Events Operating System BYOD Processors Certification Digital Websites Computer Repair Streaming Media Storage eCommerce PCI DSS Troubleshooting Windows Server 2008 R2 Telecommute Live Streaming IT PowerPoint Vulnerabilities Scams SSD Unified Communications Authentication Solid State Drive Fleet Management Tech Support Customer Relationship Management Internet Explorer Proactive IT Law Enforcement Telecommuting Recycling Remote Workers Human Resources Wireless Internet User Tip Spyware Display Safety IT Service Downloads Dark Web Sales Online Shopping Remote Support Regulations Compliance Update Content Filtering Taskbar Data loss Hosted Desktop Sports Reporting Cryptocurrency Project Management Authorization Hard Disk Drive Multi-Factor Authentication Database Alert Managed Service Provider Vulnerability Threat Personal Information Big Data Technology Tips Cleaning Managed Services Provider Network Attached Storage Environment Amazon Training Benchmarks Edge Mobile Trends Error Tablet IT budget Meetings Hybrid Cloud Outlook WannaCry Help Desk National Security HP Spam Firewall User Security Search Microsoft Teams Comparison Video Mobile Device Management Cybercrime Co-Managed IT Printing Workers E-Commerce Bitcoin Management Financial Printers Regulation WiFi Thank You Analysis

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123