The Greatest Threat to Your Security May Be Your Employees

by | May 4, 2009 | Articles

While everyone is worried about security threats outside the  company’s firewall such as hackers, viruses, and worms, research suggests that the greatest risk may come from none other than the company’s very own employees.

Not all of these risks are necessarily borne of malicious intent on the part of employees. Some risks may come from unwitting participation, temptation, or simply ignorance. Here are just some examples of security risks you should watch out for:

  1. Data theft. With the ease with which employees can connect small devices and transport data outside the company’s four walls, the risk of your sensitive data falling into the wrong hands becomes very real. Set up clear guidelines and policies regarding the use of removable storage media. You can, on your own or with the help of your IT consultant or service provider, lock down your PCs to disallow connection to removable drives or portable media devices if appropriate.
  2. Data loss. Accidents happen. Set up backup systems so that you can recover data quickly in case employees accidentally delete a file, are unable to secure a PC from viruses and worms, or are careless with the physical state and functioning of their assigned PCs.
  3. Data leaks. With the proliferation of multiple channels of online communication such as e-mail and IM, the threat of employees leaking sensitive company data to outside parties is very real. Provide clear guidelines and policies for the proper use of these communication channels in the workplace, and if needed, set up methods to block access to these services. Ask your IT consultant for help.
  4. Intellectual property violations. Illegal downloads or the illicit sharing of copyrighted material can also pose a significant threat to your organization. Legal action or the loss of your company’s hard-earned reputation can be debilitating and difficult to get over.
  5. Online Phishing and E-mail Scams. In phishing or e-mail scams, deception is used to gain unauthorized access to confidential data. Make sure you or your IT consultant set up filters to block such e-mails, or use security software to block access to this type of website.
  6. Lax/missing access controls. Be prudent and place access control policies on key information resources within your organization, such as e-mail or your accounting system. Provide each employee with access only to relevant information needed to complete his or her particular job.

It’s not easy to protect yourself from security breaches, especially when they come from within your organization. Get advice from an expert. Contact your IT Service provider today to find out more.

Related articles:

Published with permission from Source.

Related Posts

5 Easy Ways to Ensure Customer Satisfaction

5 Easy Ways to Ensure Customer Satisfaction

When it comes to running a business, popular wisdom says that “the customer is always right.” While this may not hold true in every case, the idea behind it endures.  The customer may not always right, but their satisfaction is necessary for your success.  When...

7 Things to Look for in a Virtual Assistant

7 Things to Look for in a Virtual Assistant

Your busy schedule may have you thinking about hiring an assistant. A virtual assistant is a cost-effective and efficient option to consider. Since you don’t have to provide office space, it’s cheaper than hiring someone on-site. Use this guide as you search for the...

Technology Trends: What to Expect in 2017

Technology Trends: What to Expect in 2017

A new year always brings new predictions for what will be trending and what we can all look forward to in the news, politics, entertainment, and more. In the world of technology, innovations and advancements are a fast, steady stream as developers make everything...


Give us a call and discover how great local IT services and computer support can be!