Are Your Employees an Unintentional Security Risk for Cyber Attacks?

In these times when malware is prevalent and easily disguised as email attachments or seemingly innocent software updates, one of the questions that arises is: What part do employees play in these attacks?

From Chesley Brown International

Risk Management

Tips For Reducing Security Risks Due to Human Error

 

It is estimated that more than half of security breaches are the result of human error.

In most cases, a hacker is allowed access to information by an employee via phishing attempts; manipulating them to provide confidential information; or to simply click on a link to update software or virus protection that appears to be legitimate. In the past year, some hackers have created fake but convincing emails that appear to be from Microsoft, but are in fact loaded with malicious software intended to get you to provide information that will allow access to your email.

How secure are we from internet predators? If businesses are not educating employees on how to recognize and avoid potential attacks, endpoint security may not be enough.

A few ways to reduce the impact of human error are:

• Strong password requirements and a required periodic change of passwords;
• Consider two step verification;
• Teaching employees to constantly look out for suspicious emails or verification requests;
• Be wary of public wi-fi networks and social media;
• Always remember to log out rather than simply closing the browser; and
• Monitor user activity.

It is also essential to have a process in place when employees leave. Email and administrative access passwords should be changed.

Always be prepared. Sign up for our Mailing List

Get expert insight and analysis delivered directly to your inbox.

  • This field is for validation purposes and should be left unchanged.

How Can We Help?

Contact us today to discuss how Chesley Brown can help navigate your organization navigate around ever-evolving threats, and mitigate your risk.

Meet our Experts

Kim Meador

Executive VP & COO
(888) 711-7644 | Email

Josh Noland

VP of Operations
(888) 711-7644 | Email

Max Briggs

VP of Operations
(888) 711-7644 | Email

brand protection Services helps brands protect their intellectual property

Brand Protection: How Businesses Can Identify and Stop Intellectual Property Theft

Adam Shipley was furious. He spent years building up his company’s brand of elite fishing gear, and now someone was selling counterfeits — even using lookalike packaging — through a half-dozen online marketplaces. At half price! The copycats were cheap knockoffs that broke easily. Shipley knew that because hundreds of hoodwinked customers were deluging his…
Read More
Dell Spry being promoted to Vice President Emeritus

Dell Spry Promoted to Vice President Emeritus

Dell Spry is an attorney by education a investigator by passion. He has been in law enforcement for over 30 years. In that time he served in the FBI as a Supervisory Special Agent and was lead investigator on some of the most high-profile cases in the country, including the infamous Aldrich AmesCIA Spy case.Through…
Read More
Construction worker and business man in suit shake hands after an in-depth asset search

Why your business may need an asset search

Written By: James Hart Linda Daly didn’t know exactly what was wrong, but something was off about her latest business deal.  A month earlier, Daly – the owner of a midsize retail chain in the upper Midwest — had been excited about investing in an up-and-coming manufacturer that lined up perfectly with her own mission. …
Read More