Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Do Your Employees Have Any of These Six Hackable Habits?

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

If any of your employees are stuck in the following habits, you have a problem on your hands:

Using Weak Passwords

This is the cardinal sin of anyone who uses a computer. In addition to only using one password for all of their accounts (another big security issue) this one password isn’t sufficiently secure. Too many users will take the easy route, using a pet’s name or some other easily dug-up detail as a password, assuming they don’t make it really easy for a hacker and just use “password” or “12345.” 

You need to make sure that your business’ users do better. Set certain standards that passwords need to live up to, and suggest that your employees try alternatives, like passphrases or a password manager, if remembering multiple complex passwords is a concern.

Sharing Those Weak Passwords

Exacerbating the weak password problem, there can be the temptation among your users to simply share their credentials with their coworkers to simplify workflows. This is far from the ideal situation, as it opens up your business to an increased risk of a data breach.

In fairness, some shared credentials are okay, like those for company social media accounts and other shared, impersonal resources. However, these are the exception to the rule, as they will be managed by the company.

Everyone working in your company needs to understand how their actions could potentially put the company (and, as a result, their jobs) in jeopardy, and that the safeguards you have in place (including password protection) are there to protect the company. 

Using Personal Storage for Company Files

As cloud computing has grown in popularity, it has brought a slew of issues along with its many considerable benefits. One such issue is the tendency for employees to introduce company files to their personal cloud solutions.

Granted, a lot of the time, their intentions are good. It isn’t unheard of that an employee wants to put a little bit of extra time to a project they are working on after hours, so they “take work home with them” in the best way they know how. Unfortunately, this means that they are also taking your data out from behind the protections you have in your business. While it is commendable that they want to accomplish more, they just can’t be allowed to so without the right solution in place to keep your business’ data secure.

Two Words: Shadow IT

Your business’ solutions are likely equipped with exactly the software you want your employees using as they go about their daily responsibilities. However, this may not be the software that your employees are comfortable using - they may not be familiar with it, after all. There’s still a job to be done, though.

This often leads to employees seeking out an alternative solution online and downloading it to their workstation, without first consulting with IT. This program is what is known as shadow IT, a piece of software or hardware that has not been vetted and is still introduced to a system by one of its users.

Shadow IT can cause significant problems, so it is important that your users know that any new software or hardware they would like to use needs to be run past IT first, to ensure there are no issues as a result.

Email Carelessness

Email is a considerably powerful tool for businesses to leverage, making communication far easier and faster than it once was. This doesn’t come without some trade-offs, of course. If an employee isn’t paying attention, they could easily share information with the wrong person - and the same can also be said of file sharing services 

Everyone in your organization - including you, of course - needs to respect the power of the solutions at your fingertips. While working collaboratively has become far easier, it is now much easier to let something leak as well. There needs to be an environment of awareness fostered within your business if you are to protect your investments.

Lack of Training

Speaking of fostering environments, you also need to make sure your employees are properly trained. After all, an employee who has limited-to-no experience with modern cyberthreats is going to be a much easier target than one who knows what to keep an eye out for.

As such, security needs to be a focus at every stage of employment - integral to onboarding and stressed every day. Team discussions about security measures, phishing tests, and other preventative evaluations can help you identify where more training is needed to properly prepare your team for the real deal.

Direct Technology Group can help you fix all of these habits. Call us at 954-739-4700 to learn more about our security solutions.

You Need to Prioritize Metrics that Support Effici...
Tip of the Week: How to Wind Down with Night Mode
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 17 February 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Google Efficiency Hackers Microsoft Malware Network Security Data Innovation Software Miscellaneous Productivity Smartphones User Tips Email Business Backup Hardware Mobile Devices Computer Internet communications Hosted Solutions Android Workplace Tips Productivity Communication Smartphone Windows VoIP Business Management Ransomware Small Business Windows 10 Cybersecurity Outsourced IT Upgrade Browser Managed IT Services Social Media Network Tech Term IT Support Passwords Mobile Device Employer-Employee Relationship Windows 10 IT Services Bandwidth Microsoft Office Save Money Apps Business Continuity Users Holiday Automation Collaboration Facebook Managed IT Services Office Data Backup Marketing Chrome Gadgets Internet of Things Quick Tips Cloud Computing IT Support Gmail Password Applications Data Recovery Wi-Fi Mobile Device Management Disaster Recovery Wireless Networking Apple Server Router Alert Retail Access Control Managed Service Provider Computers Information App Hacking Business Intelligence Virtualization Office Tips Phishing VPN Health Mobility Remote Computing Settings Managed Service Office 365 Analytics BYOD Laptop Physical Security Application Saving Money Remote Monitoring Blockchain Patch Management Excel Cybercrime Government Website Law Enforcement Operating System iPhone Data Management Spam Compliance Telephone Systems Bring Your Own Device Biometrics Entertainment Going Green History Twitter WiFi Mouse Big Data Value Google Drive Workers Safety Recovery Virus BDR Word Paperless Office Social Engineering Environment Politics Maintenance VoIP Data Breach Lithium-ion battery Humor Artificial Intelligence Managed IT Service Mobile Computing Battery Healthcare Company Culture End of Support Cortana Telephony Mobile Office Current Events Data Security Search G Suite Human Resources Cleaning Hosted Solution DDoS Robot Hard Drives Medical IT Tech Support IT solutions Connectivity Voice over Internet Protocol Customer Relationship Management Shadow IT Risk Management Batteries Social Network Telephone System Customer Service Internet Exlporer Wireless Charging Dark Web HIPAA Streaming Media Hybrid Cloud Fax Server The Internet of Things Tip of the week Payment Cards Cost Management Two-factor Authentication Sports PowerPoint Net Neutrality Virtual Assistant Windows 7 Information Technology Data Protection eWaste How To Scam Tech Terms Remote Monitoring and Management Smart Technology RAM User Error Printer Best Practice Files Printer Server Tablet Employee-Employer Relationship Business Technology Shortcut Data storage Vulnerability Managing Stress Processor Memes Spyware Running Cable Travel Electronic Health Records Machine Learning Uninterrupted Power Supply Chromecast Paper Monitor Entrepreneur Display Access Mobile Security Update File Management IT HP Internet exploMicrosoft Live Streaming Social Networking Tablets Employees Antivirus Telecommute Reporting Techology Sales Voice over IP Ink Meetings Reputation Multi-Factor Security Phone System Benchmarks Printers e-waste Outlook Managed Services Provider E-Commerce Google Maps Hosted Desktop Document Management Cables Advertising WhatsApp User Solid State Drive Education Data loss HaaS Knowledge eCommerce Customer Recycling Profitability Spotify Vendor Payment Firewall Digital Distributed Denial of Service Private Cloud News Copy Memory Hard Disk Drive Personal Information Staff GDPR Flexibility Comparison disposal Budget Online Shopping Downloads Eliminating Downtime Cabling instant Messaging Botnet Profiles Edge Public Cloud Bluetooth Paste Video SaaS Websites Storage Legal Specifications Touchpad Trends Programming Bitcoin Wireless Internet Distribution Vulnerabilities Managed IT Amazon USB OneNote Dongle Error Conferencing Lead Generation A.I. SharePoint Relocation Help Desk Windows XP Fleet Management Cryptocurrency IT budget Plug-In Encryption PDF Remote Support Hiring/Firing Remote Control Analyitcs Windows Server 2008 R2 Touchscreen Video Games Content Filtering Database Movies Consultant Computer Accessories Threats Certification Multi-Factor Authentication IT Management Proactive IT Notifications Staffing Hacker Spam Blocking Taskbar Technology Tips Microsoft Office 365 User Tip Tactics Black Market Training Webcam Holidays WannaCry Unified Communications Best Available Cameras Scams Time Management File Sharing YouTube Science Internet Explorer Email Management National Security Worker Backup and Disaster Recovery Authentication Alerts Telecommuting Security Cameras Virtual Private Network Hard Drive Project Management Windows 8 Chrome OS Network Attached Storage Analysis User Security NarrowBand Millennials Threat Downtime WIndows 7 Virtual Reality Unified Threat Management Updates SSD Authorization Work/Life Balance Wearables Avoiding Downtime Co-Managed IT Processors Microsoft Teams Wearable Technology Licensing Social Insurance Gadget Windows Media Player Automobile Server Management Wireless Technology Printing People Bloatware Inventory Troubleshooting