Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Do Your Employees Have Any of These Six Hackable Habits?

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

If any of your employees are stuck in the following habits, you have a problem on your hands:

Using Weak Passwords

This is the cardinal sin of anyone who uses a computer. In addition to only using one password for all of their accounts (another big security issue) this one password isn’t sufficiently secure. Too many users will take the easy route, using a pet’s name or some other easily dug-up detail as a password, assuming they don’t make it really easy for a hacker and just use “password” or “12345.” 

You need to make sure that your business’ users do better. Set certain standards that passwords need to live up to, and suggest that your employees try alternatives, like passphrases or a password manager, if remembering multiple complex passwords is a concern.

Sharing Those Weak Passwords

Exacerbating the weak password problem, there can be the temptation among your users to simply share their credentials with their coworkers to simplify workflows. This is far from the ideal situation, as it opens up your business to an increased risk of a data breach.

In fairness, some shared credentials are okay, like those for company social media accounts and other shared, impersonal resources. However, these are the exception to the rule, as they will be managed by the company.

Everyone working in your company needs to understand how their actions could potentially put the company (and, as a result, their jobs) in jeopardy, and that the safeguards you have in place (including password protection) are there to protect the company. 

Using Personal Storage for Company Files

As cloud computing has grown in popularity, it has brought a slew of issues along with its many considerable benefits. One such issue is the tendency for employees to introduce company files to their personal cloud solutions.

Granted, a lot of the time, their intentions are good. It isn’t unheard of that an employee wants to put a little bit of extra time to a project they are working on after hours, so they “take work home with them” in the best way they know how. Unfortunately, this means that they are also taking your data out from behind the protections you have in your business. While it is commendable that they want to accomplish more, they just can’t be allowed to so without the right solution in place to keep your business’ data secure.

Two Words: Shadow IT

Your business’ solutions are likely equipped with exactly the software you want your employees using as they go about their daily responsibilities. However, this may not be the software that your employees are comfortable using - they may not be familiar with it, after all. There’s still a job to be done, though.

This often leads to employees seeking out an alternative solution online and downloading it to their workstation, without first consulting with IT. This program is what is known as shadow IT, a piece of software or hardware that has not been vetted and is still introduced to a system by one of its users.

Shadow IT can cause significant problems, so it is important that your users know that any new software or hardware they would like to use needs to be run past IT first, to ensure there are no issues as a result.

Email Carelessness

Email is a considerably powerful tool for businesses to leverage, making communication far easier and faster than it once was. This doesn’t come without some trade-offs, of course. If an employee isn’t paying attention, they could easily share information with the wrong person - and the same can also be said of file sharing services 

Everyone in your organization - including you, of course - needs to respect the power of the solutions at your fingertips. While working collaboratively has become far easier, it is now much easier to let something leak as well. There needs to be an environment of awareness fostered within your business if you are to protect your investments.

Lack of Training

Speaking of fostering environments, you also need to make sure your employees are properly trained. After all, an employee who has limited-to-no experience with modern cyberthreats is going to be a much easier target than one who knows what to keep an eye out for.

As such, security needs to be a focus at every stage of employment - integral to onboarding and stressed every day. Team discussions about security measures, phishing tests, and other preventative evaluations can help you identify where more training is needed to properly prepare your team for the real deal.

Direct Technology Group can help you fix all of these habits. Call us at 954-739-4700 to learn more about our security solutions.

You Need to Prioritize Metrics that Support Effici...
Tip of the Week: How to Wind Down with Night Mode


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 29 September 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Google Network Security Hackers Data Malware Microsoft Innovation Business Software User Tips Hardware Smartphones Email Miscellaneous Communication Hosted Solutions Backup Workplace Tips Mobile Devices communications Internet Computer Small Business Android IT Support Smartphone Cybersecurity VoIP Productivity Business Management Ransomware Outsourced IT Social Media Managed IT Services Upgrade Browser Windows Windows 10 Users Collaboration Mobile Device Network Passwords Tech Term Microsoft Office Apps Cloud Computing IT Services Employer-Employee Relationship Windows 10 Bandwidth Save Money Business Continuity Automation Holiday Phishing Facebook Managed IT Services Quick Tips Office Internet of Things Marketing Chrome Data Backup Managed Service Gadgets Information IT Support Apple Health Gmail Saving Money Mobile Device Management Networking Data Recovery Server Wi-Fi Covid-19 Disaster Recovery Wireless Router Alert Analytics Password Applications Cybercrime Office Tips VPN Managed Service Provider Computers Data Breach Remote Computing Settings Access Control Hacking Retail Virtualization Office 365 Business Intelligence Mobility App Recovery Excel Government Law Enforcement Remote Work iPhone BYOD Application Battery Data Management Going Green Twitter Website Laptop Physical Security Operating System Blockchain Patch Management Remote Monitoring BDR Mobile Computing Paperless Office Value Politics Environment VoIP Maintenance Entertainment Managed IT Service WiFi Artificial Intelligence Lithium-ion battery Big Data Spam Bring Your Own Device Telephone Systems Virus Employee-Employer Relationship Biometrics Compliance Social Engineering History Mouse Google Drive Printer Conferencing Workers Safety Voice over Internet Protocol Humor Word Managing Stress Net Neutrality Data Protection Batteries Encryption Two-factor Authentication Information Technology How To Tech Terms Scam eWaste Payment Cards Smart Technology Social Network User Error Business Technology Files Vulnerability Windows 7 Best Practice Virtual Reality Data storage Cortana Shortcut Telephony Tablet End of Support Remote Monitoring and Management RAM Current Events Search Mobile Office Human Resources Hosted Solution PowerPoint Cleaning Meetings Education Processor Healthcare Company Culture DDoS Remote Robot IT solutions Hard Drives Tech Support Telephone System Data Security G Suite Customer Relationship Management Wireless Charging Dark Web Shadow IT Risk Management Customer Service HIPAA Hybrid Cloud Tip of the week Medical IT Internet Exlporer Connectivity Streaming Media Printer Server Fax Server Content Filtering Cost Management Virtual Assistant The Internet of Things Sports Eliminating Downtime Downloads SharePoint IT Management IT Video Games Staffing Spam Blocking instant Messaging Technology Tips Remote Working User Tip WannaCry Managed Services Provider Analyitcs Video Storage Wireless Internet Trends Hosted Desktop File Sharing Bitcoin Black Market Telecommuting Hacker Email Management Vulnerabilities Amazon Notifications Backup and Disaster Recovery Webcam Hard Drive Vendor OneNote YouTube Error Help Desk A.I. Phone System Worker Network Attached Storage Firewall Alerts User Security Millennials Science Cryptocurrency Plug-In User SSD PCI DSS Database Processors Licensing Windows Server 2008 R2 NarrowBand Touchscreen Downtime Gadget Certification Movies Server Management Profiles Work/Life Balance Threats Avoiding Downtime Windows 8 Proactive IT Inventory Regulations Compliance Tactics Automobile Spyware Distribution Travel Taskbar Wireless Technology Microsoft Office 365 Training Unified Communications Wearable Technology Machine Learning Computer Repair Social Scams Time Management Bluetooth Mobile Security Innovations Internet Explorer People HP Fleet Management Bloatware Live Streaming National Security Chromecast Authentication Monitor Security Cameras Running Cable Access Telecommute IT Service Sales Project Management Voice over IP Internet exploMicrosoft Multi-Factor Security Chrome OS Analysis USB Uninterrupted Power Supply e-waste Threat Antivirus Document Management Multi-Factor Authentication Entrepreneur Techology WhatsApp Updates Authorization Reputation Wearables Microsoft Teams Printers Data loss Mobile Social Networking Knowledge Insurance Google Maps eCommerce Tablets Advertising Printing Digital Holidays HaaS News Troubleshooting Customer Copy Consultant Staff Computer Accessories Spotify Comparison Online Shopping Private Cloud Electronic Health Records Update Paper Personal Information Edge Virtual Private Network Flexibility Display Paste Best Available Distributed Denial of Service Websites Remote Workers Cameras Cabling Specifications Budget Botnet Memory Public Cloud Employees Reporting Outlook Ink SaaS Co-Managed IT Legal Benchmarks Touchpad E-Commerce Cables Dongle Managed IT Lead Generation Solid State Drive Profitability WIndows 7 IT budget Memes Unified Threat Management Programming Remote Support Recycling Hiring/Firing Relocation Remote Control Payment Management Windows XP disposal File Management Windows Media Player PDF Hard Disk Drive GDPR