Are Your Employees an Unintentional Security Risk for Cyber Attacks?

In these times when malware is prevalent and easily disguised as email attachments or seemingly innocent software updates, one of the questions that arises is: What part do employees play in these attacks?

From Chesley Brown International

Risk Management

[dpArticleShare]

Tips For Reducing Security Risks Due to Human Error

 

It is estimated that more than half of security breaches are the result of human error.

In most cases, a hacker is allowed access to information by an employee via phishing attempts; manipulating them to provide confidential information; or to simply click on a link to update software or virus protection that appears to be legitimate. In the past year, some hackers have created fake but convincing emails that appear to be from Microsoft, but are in fact loaded with malicious software intended to get you to provide information that will allow access to your email.

How secure are we from internet predators? If businesses are not educating employees on how to recognize and avoid potential attacks, endpoint security may not be enough.

A few ways to reduce the impact of human error are:

• Strong password requirements and a required periodic change of passwords;
• Consider two step verification;
• Teaching employees to constantly look out for suspicious emails or verification requests;
• Be wary of public wi-fi networks and social media;
• Always remember to log out rather than simply closing the browser; and
• Monitor user activity.

It is also essential to have a process in place when employees leave. Email and administrative access passwords should be changed.

Always be prepared. Sign up for our Mailing List

Get expert insight and analysis delivered directly to your inbox.

  • This field is for validation purposes and should be left unchanged.

How Can We Help?

Contact us today to discuss how Chesley Brown can help navigate your organization navigate around ever-evolving threats, and mitigate your risk.

Meet our Experts

Kim Meador

Executive VP & COO
(888) 711-7644 | Email

Josh Noland

VP of Operations
(888) 711-7644 | Email

Max Briggs

VP of Operations
(888) 711-7644 | Email

Workplace violence prevention

Spot the Signs: Preempting Workplace Violence Through Intelligence

Learn to recognize pre-threat behavioral indicators and prevent workplace violence with intelligence and proactive risk management strategies.
Read More
Elaborating growth strategy of company. Security as a Growth Driver

Using Security as a Strategic Growth Driver for Business

Written By: James Hart For a growing number of companies, security has become more than a line item in the budget. It’s evolving into a driver of strategic business growth.  A consistent focus on security – ideally overseen by a Chief Security Officer (CSO) or similar role — allows these firms to enhance their operations…
Read More
An IT employee conducting Security audits for compliance, workplace security audit, regulatory compliance checklist, audit preparation

Security Audits for Compliance: How to Prepare for Internal and External Audits

Written By: James Hart Conducting a security audit of your business or property isn’t just a good idea. Sometimes, it’s required for compliance reasons.  Organizations may have to complete a review as a condition of their insurance policies. Sometimes regulations or business partners demand it, especially if those audits are related to cybersecurity or data…
Read More

SIGN UP FOR EXCLUSIVE INSIGHTS

Get the latest Chesley Brown insights and strategies directly in your inbox.

Sign Up Form Inline

  • This field is for validation purposes and should be left unchanged.