Why your staff are your biggest cyber security threat...
Thomas Reid, a trained Scottish philosopher once said in his Essays on the Intellectual Powers of Man, 1786, “A chain is no stronger than its weakest link”. The same is true for cyber security in business, where you are only as strong as your least informed employee. Cyber-criminals will prey on the most vulnerable, and that is your employees.
The 2019 Insider Data Breach survey highlighted this, where 79% of CIOs said they believe employees have put company data at risk accidentally in the last 12 months, while 61% think employees have put company data at risk maliciously.
Businesses continue to plough resources into cyber crime prevention. However, this is little help when it comes to your biggest weakness – your employees; 90% of data breaches are caused by human error.
With this in mind, let’s take a look at some of the reasons employees pose the biggest cyber security threat to your organisation.
Password Management
Statistics show that 63% of data breaches in businesses involve weak or stolen passwords. Many people are guilty of using birthdays, simple keyboard patterns and celebrity names, but these are far too easy for a cyber-criminal to guess. Splash Data evaluated more than 5 million leaked passwords in 2018 and discovered that ‘123456’ and ‘password’ were yet again in the lead for the most commonly used passwords.
If you want to help reduce the threat your employees pose with their passwords, password management should be a priority. Some of our tips how to do improve this are below:
- Train and remind employees how to create a strong password. You can read our complete guide to creating a password that doesn’t SUCK here.
- Encourage the use of two-factor authentication (2FA) to add that extra layer.
- The PCs in your organisation should have a requirement where the password has to have uppercase letters, lowercase letters, numbers, and symbols.
- Prompt employees to change their password every 45 to 90 days.
The rise of ‘BYOD’
In 2019 work is more mobile than ever, and with that comes the rise of BYOD (Bring Your Own Device). While this has brought many benefits to employees as well as employers, the challenge of finding the most appropriate security solutions to mitigate the security risks associated with BYOD remains.
A common example of a security risk is associated with the remote working trend when employees work at coffee shops, at home, or when travelling. To do this, they often need to connect to hotspots. Unfortunately, public Wi-Fi makes it very easy for cyber criminals to access your business data. We recently heard from Dorset Police first hand of the dangers of public Wi-Fi when a hotel in Bournemouth experienced a cyber-criminal setting up their own Wi-Fi network. While people could still use this ‘duplicate’ Wi-Fi as normal, it also allowed the hacker to gain access to personal and sensitive information of guests.
In order to prevent your business data falling into the wrong hands, you will either need to train your employees on the importance of using a VPN (Virtual Private Network) or look into implementing some form of virtual environment such as a Hosted Workspace for your employees.
A VPN works by encrypting your data through a tunnel that runs between you and the VPN server, acting as a gateway to the Internet and so no one can see it. To find out more about VPNs, you can read our blog here.
A Hosted Workspace that is provided by entrustIT works by having apps and data stored in the cloud in ISO27001 data centres, rather than employees logging into their PC and having all apps and data on your local hard drive. Connecting to the Workspace is done so via the Internet through a firewall where it won’t be hacked, lost or damaged. You can find out more about the entrustIT Hosted Workspace here.
If you’re going to allow BYOD in your organisation, it is vital that a programme is built with clear policies that meet not only employee but security needs. By following the right approach, it is possible to take advantage of the benefits of BYOD without adding significant risk.
Malicious leaks
Not everyone will have your business’ best interests at heart. According to surprising new research, one in four (24 percent) UK employees have intentionally leaked confidential business information to individuals outside of their organisations.
In 2018, Tesla experienced this the hard way when an employee created false usernames in order to make direct changes to the company source code. The employee also exported large amounts of highly sensitive data to unknown third parties. Tesla believe that the employee was triggered to steal the information a month before after being reassigned to an undisclosed new role.
Because of this risk, HR has a role to ensure the workplace culture is aware of the issues around data. They should also be checking that employees only have access to information that they need to do their job to help minimise the risk of it falling into the wrong hands.
Accidental leaks
Most of the time, employees do not share data on purpose, and only realise when it’s too late. This is especially relevant in today’s fast-paced business world where employees multitask and become distracted, causing them to make mistakes such as sending a sensitive attachment to the wrong contact. You should be training your employees to double check email-addresses and contact lists before hitting the ‘send’ button and have them practice file-name standards.
In addition to accidentally sharing data, they may also unknowingly fall for phishing emails. These are sent by cyber-criminals that have been designed to look like they are sent from a legitimate company and ask for sensitive information. More often than not, phishing emails contain a link within the email which can take you to a fake website with a form for you to input your details, or the link once clicked on will begin to download malicious software.
Employees are one of the weakest links in a business’ cyber security system. By committing to the right awareness training, you can reduce the risk of your business falling victim to cybercrime. The awareness shouldn’t just stop after one training course, and should continue throughout the time an employee is with your business.
If you’re ready to take the next step, why not download our FREE cyber security White Paper >>>
Subscribe here!
Recent Posts
Posts by tag
- technology (124)
- Security (97)
- cyber security (85)
- IT Security (81)
- Cloud (65)
- Microsoft 365 (63)
- modern technology (62)
- Managed Service (60)
- business (60)
- cloud computing (59)
- cyber attack (54)
- workplace (54)
- IT support (53)
- cloud it (53)
- Microsoft Teams (52)
- microsoft (51)
- Working from home (50)
- productivity (47)
- office (46)
- cybersecurity (44)
- office 365 (44)
- IT (41)
- Uncategorised (38)
- employees (38)
- entrustit (38)
- flexible work (36)
- Password Security (34)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- Cyber (24)
- cyber privacy (22)
- public cloud (22)
- computing (21)
- email security (20)
- password (20)
- it support bournemouth (19)
- passwords (19)
- entrust (18)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- it support dorset (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- hackers (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cloud cctv (13)
- covid-19 (13)
- hack (13)
- it support hampshire (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- cctv (12)
- hardware (12)
- internet (12)
- it consultancy (12)
- 2020 (11)
- 2022 (11)
- hybrid cloud (11)
- internet safety (11)
- IT costs (10)
- Microsoft Planner (10)
- data breach (10)
- it consultancy bournemouth (10)
- it support southampton (10)
- it support winchester (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- windows 10 (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- it consultancy hampshire (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- it consultancy dorset (8)
- it consultancy southampton (8)
- msp (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Google (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- partnership (7)
- 2019 (6)
- Apple (6)
- Hampshire (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- usecure (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Bournemouth (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- awards (5)
- brexit (5)
- designer (5)
- personal data (5)
- resources (5)
- smartphone (5)
- website (5)
- Access Management (4)
- BYOD (4)
- Dorset (4)
- Facebook (4)
- Government (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- Attacks (3)
- Case Studies (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Microsoft Forms (3)
- NHS (3)
- New Forest (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- instagram (3)
- internet of things (3)
- meetings (3)
- sme (3)
- storage (3)
- surrey (3)
- teaching (3)
- trump (3)
- twitter (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- DR (2)
- DR planning (2)
- Environment (2)
- Firewall (2)
- Gen Z (2)
- ISBA (2)
- Local (2)
- Macs (2)
- Microsoft Copilot (2)
- PaaS (2)
- Tiva (2)
- android (2)
- artificial intelligence (2)
- award winning (2)
- bcs (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- innovation (2)
- legalex (2)
- london (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- strategy (2)
- united kingdom (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AI (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- ChatGPT (1)
- Cloudtango (1)
- GPT-4 (1)
- Go Integrator (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- Loop (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Mr Mulligans (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Privacy Shield (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Surrey Business Awards (1)
- Sydenhams (1)
- Tech Company of the Year (1)
- The Business Magazine (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- builders merchant (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- copilot (1)
- copilot pro (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- procrastination (1)
- recruitment (1)
- research (1)
- serval systems (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)