Are Your Employees an Unintentional Security Risk for Cyber Attacks?

In these times when malware is prevalent and easily disguised as email attachments or seemingly innocent software updates, one of the questions that arises is: What part do employees play in these attacks?

CB-Seal-White-250

From Chesley Brown International

Risk Management

Tips For Reducing Security Risks Due to Human Error

 

It is estimated that more than half of security breaches are the result of human error.

In most cases, a hacker is allowed access to information by an employee via phishing attempts; manipulating them to provide confidential information; or to simply click on a link to update software or virus protection that appears to be legitimate. In the past year, some hackers have created fake but convincing emails that appear to be from Microsoft, but are in fact loaded with malicious software intended to get you to provide information that will allow access to your email.

How secure are we from internet predators? If businesses are not educating employees on how to recognize and avoid potential attacks, endpoint security may not be enough.

A few ways to reduce the impact of human error are:

• Strong password requirements and a required periodic change of passwords;
• Consider two step verification;
• Teaching employees to constantly look out for suspicious emails or verification requests;
• Be wary of public wi-fi networks and social media;
• Always remember to log out rather than simply closing the browser; and
• Monitor user activity.

It is also essential to have a process in place when employees leave. Email and administrative access passwords should be changed.

Always be prepared. Sign up for our Mailing List

Get expert insight and analysis delivered directly to your inbox.

  • This field is for validation purposes and should be left unchanged.

How Can We Help?

Contact us today to discuss how Chesley Brown can help navigate your organization navigate around ever-evolving threats, and mitigate your risk.

Meet our Experts

Kim Meador

Executive VP & COO
(888) 711-7644 | Email

Josh Noland

VP of Operations
(888) 711-7644 | Email

Max Briggs

VP of Operations
(888) 711-7644 | Email

risk-takers #2 Terry Fisher — Electronic Countermeasures

Have you ever stopped to ask yourself what it is about your business that is truly valuable? When you really think about it, any business with a product or service has something a competitor or adversary could use. And if you're being honest, you probably haven't fully considered all the ways they might get their hands on that information. You've spent years building your business, but all it takes is one bad day to compromise that dream. In this week's episode Brent sits down with FBI Special Agent (Ret.) and engineer Terry Fisher to discuss corporate espionage, electronic countermeasures (sweeps), bugging, and the common methods bad actors have used throughout history to gain access to proprietary information.
Read More

risk-takers #3 Surveillance Detection Routes (SDR)

Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It's a frightening thought. You've spent years building your business, but all it takes is one bad day to compromise that dream. In this week's episode Brent sits down with FBI Special Agent (Ret.) Dell Spry to discuss surveillance detection routes, what they are, and how they can be used as a spy detector device to find out if you are under surveillance.
Read More

risk-takers #04 Brad Orsini – Community-based Security

Visiting our places of worship shouldn't be dangerous. Unfortunately, faith-based organizations are facing the difficult challenge of how to protect their congregations from religion-motivated violence, and still maintain the welcoming, open environment community members expect. In this week's episode Brent calls up Bradley Orsini, the Senior National Security Advisor of the Secure Community Network, the official safety and security organization of the Jewish community in North America to discuss these issues, lessons learned from the mass shooting at the Tree of Life Synagogue, and the most effective strategies faith-based organizations can use to protect their congregations.
Read More

SIGN UP FOR EXCLUSIVE INSIGHTS

Get the latest Chesley Brown insights and strategies directly in your inbox.

Sign Up Form Inline

  • This field is for validation purposes and should be left unchanged.