Advantage IT Management Blog

Do Your Employees Have Any of These Six Hackable Habits?

Do Your Employees Have Any of These Six Hackable Habits?

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

If any of your employees are stuck in the following habits, you have a problem on your hands:

Using Weak Passwords

This is the cardinal sin of anyone who uses a computer. In addition to only using one password for all of their accounts (another big security issue) this one password isn’t sufficiently secure. Too many users will take the easy route, using a pet’s name or some other easily dug-up detail as a password, assuming they don’t make it really easy for a hacker and just use “password” or “12345.” 

You need to make sure that your business’ users do better. Set certain standards that passwords need to live up to, and suggest that your employees try alternatives, like passphrases or a password manager, if remembering multiple complex passwords is a concern.

Sharing Those Weak Passwords

Exacerbating the weak password problem, there can be the temptation among your users to simply share their credentials with their coworkers to simplify workflows. This is far from the ideal situation, as it opens up your business to an increased risk of a data breach.

In fairness, some shared credentials are okay, like those for company social media accounts and other shared, impersonal resources. However, these are the exception to the rule, as they will be managed by the company.

Everyone working in your company needs to understand how their actions could potentially put the company (and, as a result, their jobs) in jeopardy, and that the safeguards you have in place (including password protection) are there to protect the company. 

Using Personal Storage for Company Files

As cloud computing has grown in popularity, it has brought a slew of issues along with its many considerable benefits. One such issue is the tendency for employees to introduce company files to their personal cloud solutions.

Granted, a lot of the time, their intentions are good. It isn’t unheard of that an employee wants to put a little bit of extra time to a project they are working on after hours, so they “take work home with them” in the best way they know how. Unfortunately, this means that they are also taking your data out from behind the protections you have in your business. While it is commendable that they want to accomplish more, they just can’t be allowed to so without the right solution in place to keep your business’ data secure.

Two Words: Shadow IT

Your business’ solutions are likely equipped with exactly the software you want your employees using as they go about their daily responsibilities. However, this may not be the software that your employees are comfortable using - they may not be familiar with it, after all. There’s still a job to be done, though.

This often leads to employees seeking out an alternative solution online and downloading it to their workstation, without first consulting with IT. This program is what is known as shadow IT, a piece of software or hardware that has not been vetted and is still introduced to a system by one of its users.

Shadow IT can cause significant problems, so it is important that your users know that any new software or hardware they would like to use needs to be run past IT first, to ensure there are no issues as a result.

Email Carelessness

Email is a considerably powerful tool for businesses to leverage, making communication far easier and faster than it once was. This doesn’t come without some trade-offs, of course. If an employee isn’t paying attention, they could easily share information with the wrong person - and the same can also be said of file sharing services 

Everyone in your organization - including you, of course - needs to respect the power of the solutions at your fingertips. While working collaboratively has become far easier, it is now much easier to let something leak as well. There needs to be an environment of awareness fostered within your business if you are to protect your investments.

Lack of Training

Speaking of fostering environments, you also need to make sure your employees are properly trained. After all, an employee who has limited-to-no experience with modern cyberthreats is going to be a much easier target than one who knows what to keep an eye out for.

As such, security needs to be a focus at every stage of employment - integral to onboarding and stressed every day. Team discussions about security measures, phishing tests, and other preventative evaluations can help you identify where more training is needed to properly prepare your team for the real deal.

Advantage IT Management can help you fix all of these habits. Call us at 251-662-9770 to learn more about our security solutions.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 17 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Productivity Network Security Hackers Malware User Tips Efficiency Hardware Google Microsoft communications Communication Computer Data Tech Term Smartphones Cybersecurity Internet Software Innovation Email Ransomware Managed IT Services Backup Mobile Device Business Management Outsourced IT Business VoIP Passwords Windows 10 Smartphone Hosted Solutions Android IT Support Small Business Users Apps Managed IT Services Network Social Media Browser Gadgets Miscellaneous Alert Mobile Devices IT Services Internet of Things Wi-Fi Bandwidth Applications Collaboration Windows Microsoft Office Cloud Computing Data Backup Save Money Workplace Tips Business Intelligence Employer-Employee Relationship Information Saving Money Holiday Data Recovery Computers Facebook Twitter Password IT Support Blockchain Router Virtualization Access Control Chrome Wireless Data Management Office Upgrade Business Continuity Gmail Managed Service Word Paperless Office Value Patch Management Laptop Quick Tips Law Enforcement Data Breach Settings Telephony BYOD Government Automation Excel Office 365 Mobile Device Management Analytics Phishing Workers Physical Security Battery Networking Politics Hosted Solution Marketing Vulnerability VoIP Cybercrime Company Culture Update RAM Telephone Systems Compliance BDR Cortana Retail How To VPN Operating System Virtual Assistant Going Green Voice over Internet Protocol Healthcare Maintenance Education Artificial Intelligence Website Health Cost Management Net Neutrality Data Protection Disaster Recovery Virus Productivity Remote Monitoring and Management Apple Data Security Medical IT Server Dark Web HIPAA G Suite Mobility Spam App Hacking Wireless Charging Processor Managed IT Service iPhone Tip of the week Scam Tech Terms Connectivity Remote Computing Remote Monitoring Smart Technology Recovery Access Google Maps Storage Solid State Drive Printers Data loss Hybrid Cloud Security Cameras Worker Spyware Business Technology Information Technology Lithium-ion battery Network Attached Storage Downloads Telecommuting Managed IT Wireless Internet Bitcoin Lead Generation Inventory Managed Service Provider Chrome OS Printing Google Drive Specifications Taskbar Streaming Media Benchmarks eCommerce Gadget Live Streaming Files Plug-In instant Messaging Work/Life Balance Error Hard Disk Drive Personal Information Staff Office Tips Cables Wearables Printer HP Remote Control Human Resources Server Management Trends Microsoft Teams Help Desk Payment Cards Mobile Security Remote Support Avoiding Downtime Paper Two-factor Authentication Conferencing Troubleshooting National Security Tech Support Risk Management Online Shopping Technology Tips Shortcut WhatsApp Proactive IT Vulnerabilities Spam Blocking Sales Touchscreen Video SaaS Websites Disaster WiFi Document Management Database Reporting Employee-Employer Relationship Biometrics DDoS A.I. Managing Stress Certification WannaCry Environment IT budget Ink Content Filtering Spotify Botnet Outlook Backup and Disaster Recovery Cryptocurrency Antivirus Digital Tactics Email Management Tablet Microsoft Office 365 Customer Service eWaste Best Practice Updates Millennials Safety Emergency Automobile Electronic Health Records Distributed Denial of Service Machine Learning Movies The Internet of Things Windows 10 Hard Drive e-waste Copy File Sharing IT Management PowerPoint Multi-Factor Security User Tip Profitability Recycling Hard Drives News Analysis Windows 7 Edge Internet Explorer Knowledge Authentication OneNote Phone System Licensing Sports Amazon E-Commerce Social Engineering Search GDPR Employees Entertainment Printer Server Telecommute Unified Communications Uninterrupted Power Supply Windows XP Bring Your Own Device Training Processors disposal Paste User Security Cabling Eliminating Downtime Batteries SSD Telephone System Time Management Big Data Threat Comparison Current Events Authorization Windows Server 2008 R2 Cleaning Display Voice over IP Dongle Travel Webcam Payment Social Leadership Thank You Unified Threat Management Scalability Budget Dark Data Computer Care Yahoo Congratulations Regulation Instagram Credit Cards Chromecast Encryption Gaming Console Wireless Technology Employer Employee Relationship Trending Vendor Management Video Games Internet Exlporer Financial Freedom of Information IaaS Hiring/Firing Synergy Autocorrect CrashOverride HaaS Administrator Staffing Emoji Money Scheduling Television Samsung

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Mia Taylor Tip of the Week: How to Handle a Paper Jam Without Freaking Out
13 September 2019
You have posted a fantastic blog! This is the best blog, most concise step by step guide. Toshiba te...
Galvin Caldwell How and Why Cyber Crime is so Effective
06 September 2019
Cyber crime is the crime has the well recognized worth all over the world due to the lack of the sec...
Abby Aspinall Ransomware Increasingly Targets Android Devices
27 August 2019
Ransom ware has some targets that were among the all android devices that were good to be read over ...
JozephChristopher Google Wants You to Tweet Emojis at Them. Here’s Why
22 August 2019
As per my research with a dissertation writing services company, Google was working on this from a l...
Chris Greenwalty Most Noteworthy Data Breaches in 2019
21 August 2019
Since there are many threats that we are listening about data breach. You need to figure out the bes...