Previous Page  6 / 8 Next Page
Information
Show Menu
Previous Page 6 / 8 Next Page
Page Background

6

SEPTEMBER 2016

H

ackers are certainly responsible for many computer viruses and phishing

attacks. But they’re not the only culprits. Security breaches can also occur from

inside a business—ranging from deliberate actions by disgruntled employees

to accidental breaches caused by human error.

Don’t wait for a problem to occur. Review these basic precautions to help protect

your company data from internal threats:

1.

Revoke account access when an employee leaves.

This is the single best

thing you can do to prevent security breaches. With a few keystrokes, an outgoing

employee with an ax to grind could do serious damage.

2.

Do your backups.

An essential safeguard against internal data sabotage is hav-

ing an effective backup system to keep mission-critical data secure. This statement

can’t be repeated often enough.

3.

Account for data and tech devices your employees own.

The prolifer-

ation of personal devices (such as smartphones and tablets) used for work purposes

has led to a business environment where personal activities commingle with work.

By allowing employees to use their own equipment, your business loses some

control over security issues. You may want to have employees sign an agreement

regarding the proper use of such devices.

4.

Protect against downloading of malicious content.


The average employee

in a small business spends up to an hour a day doing personal online activities such

as playing games or using social media. Malware and virus threats can be inadver-

tently introduced to a computer network by employees via a rootkit hidden in a game

or a video clip. The best advice is to constantly update and patch your IT systems to

ensure protection.

5.

Educate employees about social engineering.

One of the most common

ways for attackers to gain access to a network is by exploiting the trusting nature of

your employees. Make sure your employees know not to provide

their password over the telephone and teach them how to

recognize a phishing email.

Threats to data security can come from many places. If you

take a multi-faceted approach that addresses both external

and internal issues, your business can reduce the odds

that a breach will take place.

Unhappy or careless employees

also pose a threat to your data

Hackers Don’t Cause All

Security Breaches

EYE-OPENING DATA

ABOUT SECURITY

AND DOWNTIME

If you think security breaches won’t happen

to your business, you may want to think

again. Check out these statistics:

• 45 percent of employees receive no

cybersecurity training from their employ-

ers. (

CompTIA CyberSecure Report, 2015

)

• The top endpoint security concern is an

infected personal device connecting to

the corporate network. (

Malware

Mutation, InformationWeek, 2014

)

• 58 percent of downtime incidents are

caused by human error alone. Natural

disasters account for only 10 percent

of downtime. (

Enterprise and the Cost

of Downtime, Independent Oracle User

Group, 2012

)

• The exact cost of downtime depends

on company size: small companies lose

approximately $8,581 per hour, medium

companies $215,638 per hour; and large

enterprises $686,250 for every hour of

downtime. (

Downtime and Data Loss:

How Much Can You Afford? Aberdeen

Group, 2013

)

• Less than half of survey participants

believe that their business is “very pre-

pared” to recover their IT assets in the

event of a disaster. (

The 2015 Disaster

Recovery & Business Continuity Survey

)

To discuss security or downtime

concerns at your business, call a

Networks Plus Business Consultant

at 800-299-1704.