Alltech IT Solutions Blog

Do Your Employees Have Any of These Six Hackable Habits?

Do Your Employees Have Any of These Six Hackable Habits?

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

If any of your employees are stuck in the following habits, you have a problem on your hands:

Using Weak Passwords

This is the cardinal sin of anyone who uses a computer. In addition to only using one password for all of their accounts (another big security issue) this one password isn’t sufficiently secure. Too many users will take the easy route, using a pet’s name or some other easily dug-up detail as a password, assuming they don’t make it really easy for a hacker and just use “password” or “12345.” 

You need to make sure that your business’ users do better. Set certain standards that passwords need to live up to, and suggest that your employees try alternatives, like passphrases or a password manager, if remembering multiple complex passwords is a concern.

Sharing Those Weak Passwords

Exacerbating the weak password problem, there can be the temptation among your users to simply share their credentials with their coworkers to simplify workflows. This is far from the ideal situation, as it opens up your business to an increased risk of a data breach.

In fairness, some shared credentials are okay, like those for company social media accounts and other shared, impersonal resources. However, these are the exception to the rule, as they will be managed by the company.

Everyone working in your company needs to understand how their actions could potentially put the company (and, as a result, their jobs) in jeopardy, and that the safeguards you have in place (including password protection) are there to protect the company. 

Using Personal Storage for Company Files

As cloud computing has grown in popularity, it has brought a slew of issues along with its many considerable benefits. One such issue is the tendency for employees to introduce company files to their personal cloud solutions.

Granted, a lot of the time, their intentions are good. It isn’t unheard of that an employee wants to put a little bit of extra time to a project they are working on after hours, so they “take work home with them” in the best way they know how. Unfortunately, this means that they are also taking your data out from behind the protections you have in your business. While it is commendable that they want to accomplish more, they just can’t be allowed to so without the right solution in place to keep your business’ data secure.

Two Words: Shadow IT

Your business’ solutions are likely equipped with exactly the software you want your employees using as they go about their daily responsibilities. However, this may not be the software that your employees are comfortable using - they may not be familiar with it, after all. There’s still a job to be done, though.

This often leads to employees seeking out an alternative solution online and downloading it to their workstation, without first consulting with IT. This program is what is known as shadow IT, a piece of software or hardware that has not been vetted and is still introduced to a system by one of its users.

Shadow IT can cause significant problems, so it is important that your users know that any new software or hardware they would like to use needs to be run past IT first, to ensure there are no issues as a result.

Email Carelessness

Email is a considerably powerful tool for businesses to leverage, making communication far easier and faster than it once was. This doesn’t come without some trade-offs, of course. If an employee isn’t paying attention, they could easily share information with the wrong person - and the same can also be said of file sharing services 

Everyone in your organization - including you, of course - needs to respect the power of the solutions at your fingertips. While working collaboratively has become far easier, it is now much easier to let something leak as well. There needs to be an environment of awareness fostered within your business if you are to protect your investments.

Lack of Training

Speaking of fostering environments, you also need to make sure your employees are properly trained. After all, an employee who has limited-to-no experience with modern cyberthreats is going to be a much easier target than one who knows what to keep an eye out for.

As such, security needs to be a focus at every stage of employment - integral to onboarding and stressed every day. Team discussions about security measures, phishing tests, and other preventative evaluations can help you identify where more training is needed to properly prepare your team for the real deal.

Alltech IT Solutions can help you fix all of these habits. Call us at 954-628-3770 to learn more about our security solutions.

You Need to Prioritize Metrics that Support Effici...
Tip of the Week: How to Wind Down with Night Mode
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 12 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Telecommute Employees Social Media Data Security Quick Tips Communications Law Enforcement DDoS Managed IT Services IT Management Website Internet Electronic Health Records Windows 7 File Management Workers User Tips Healthcare Phone System Bitcoin Business Computing HIPAA Scams Threats Threat Update Avoiding Downtime IaaS Recycling VoIP Chrome OS Unified Communications Safety Tactics Tip of the Week Windows Server 2008 R2 Managed IT Internet of Things Managed Service Provider Trends Value eCommerce Productivity Windows 10 Politics Productivity Display Security Cameras Cost Management Online Shopping Video Games Managed IT Service Synergy Emoji Users Windows Solid State Drive Movies Work/Life Balance Staff Phishing Antivirus Cortana Tech Term Information Technology Business Continuity Knowledge Digital Gadgets Education Office 365 PowerPoint App IT Support Human Resources Server Management Travel Cybersecurity Managed Services Provider Botnet Certification Recovery Congratulations Telecommuting WannaCry Personal Information Live Streaming Privacy Operating System Gadget Word Hard Drive Mobile Devices Data Backup Webcam Chrome Hosted Solution Excel A.I. Scalability Microsoft Office 365 Proactive IT Current Events Microsoft Thank You Spam Blocking Streaming Media Google Drive Managing Stress Comparison Apps Big Data Best Practices Project Management G Suite Shortcut Two-factor Authentication Upgrade Email Management Gmail Computer Care Hard Disk Drive Compliance Connectivity Hard Drives Processor Benchmarks Wireless Internet User Security Training How To Internet Explorer Instagram Technology Tips Data loss Printers Ransomware Bandwidth Router Lead Generation Small Business SSD Payment Google Vulnerabilities Hybrid Cloud Wireless Gaming Console Vulnerability Risk Management Sales Smartphones Paper Physical Security Virus Outlook Hiring/Firing Biometrics Money instant Messaging Hackers Disaster Recovery Automation Password Unified Threat Management Business Smart Technology Cybercrime Network Communication Network Attached Storage Efficiency Wi-Fi Patch Management Laptop Battery Technology Company Culture Microsoft Teams Video Wearables Vendor Management IT Support Scheduling Copy Files Taskbar Tech Terms Financial Processors Miscellaneous Twitter Payment Cards Wireless Charging Networking Windows 10 IT budget Budget Mobility Server Credit Cards e-waste Yahoo Spam Troubleshooting Ink Passwords Blockchain Telephone System Business Intelligence Tip of the week Malware Apple Authorization VPN Save Money HP Database Millennials Licensing Dongle Computers VoIp Remote Computing Emergency Security Voice over Internet Protocol Office Tips Amazon Spyware disposal RAM Remote Control Customer Service Maintenance File Sharing Profitability National Security WhatsApp GDPR Mobile Office Google Maps Facebook Websites Plug-In Network Security Retail Managed IT Services Spotify Hacker Cloud Medical IT Sports Inventory Automobile Browser Remote Monitoring and Management Employer Employee Relationship Health Data Specifications Encryption Office Holiday Data Recovery Backup Business Management Content Filtering Time Management Computer Voice over IP Saving Money Mobile Device Management Worker Android Cables Entertainment Paperless Office Telephone Systems OneNote Going Green Document Management IT Services Hosted Solutions Analysis Artificial Intelligence CrashOverride Mobile Device WiFi BDR Remote Support Net Neutrality Hardware Information Bring Your Own Device Multi-Factor Security Analytics Batteries Marketing SaaS Leadership Alerts Virtualization Workplace Tips Storage Downloads Employer-Employee Relationship Mobile Security Business Technology Help Desk Touchscreen Authentication Email User Tip Printing Regulation Error eWaste Applications Telephony Innovation Employee-Employer Relationship The Internet of Things Virtual Assistant Autocorrect Tech Support Television Outsourced IT Alert Updates Access Control Access iPhone Reporting Government Settings Microsoft Office Smartphone Managed Service Insurance Conferencing Staffing E-Commerce Data Protection Cleaning HaaS Paste Printer Server Cloud Computing Data Breach Machine Learning Samsung Scam Remote Monitoring Cryptocurrency Edge BYOD News Search Dark Web Data Management Environment Software Freedom of Information Collaboration Cabling Printer Tablet Windows XP Backup and Disaster Recovery Vendor Dark Data Eliminating Downtime Hacking