Are Your Employees an Unintentional Security Risk for Cyber Attacks?

In these times when malware is prevalent and easily disguised as email attachments or seemingly innocent software updates, one of the questions that arises is: What part do employees play in these attacks?

CB-Seal-White-250

From Chesley Brown International

Risk Management

Tips For Reducing Security Risks Due to Human Error

 

It is estimated that more than half of security breaches are the result of human error.

In most cases, a hacker is allowed access to information by an employee via phishing attempts; manipulating them to provide confidential information; or to simply click on a link to update software or virus protection that appears to be legitimate. In the past year, some hackers have created fake but convincing emails that appear to be from Microsoft, but are in fact loaded with malicious software intended to get you to provide information that will allow access to your email.

How secure are we from internet predators? If businesses are not educating employees on how to recognize and avoid potential attacks, endpoint security may not be enough.

A few ways to reduce the impact of human error are:

• Strong password requirements and a required periodic change of passwords;
• Consider two step verification;
• Teaching employees to constantly look out for suspicious emails or verification requests;
• Be wary of public wi-fi networks and social media;
• Always remember to log out rather than simply closing the browser; and
• Monitor user activity.

It is also essential to have a process in place when employees leave. Email and administrative access passwords should be changed.

Always be prepared. Sign up for our Mailing List

Get expert insight and analysis delivered directly to your inbox.

  • This field is for validation purposes and should be left unchanged.

How Can We Help?

Contact us today to discuss how Chesley Brown can help navigate your organization navigate around ever-evolving threats, and mitigate your risk.

Meet our Experts

Kim Meador

Executive VP & COO
(888) 711-7644 | Email

Josh Noland

VP of Operations
(888) 711-7644 | Email

Max Briggs

VP of Operations
(888) 711-7644 | Email

risk-takers #1 The Aldrich Ames Espionage Case

Dell Spry, a former FBI investigator and counterespionage expert, sits down to discuss the biggest case of insider theft in U.S. History: The Aldrich Ames Case. Hear how he, along with the help of the CIA, and the fellow FBI agents used their cunning, hard work, and old fashioned investigative work to capture and convict most infamous CIA officer-turned traitor: Aldrich Hazan "Rick" Ames. Beginning in 1985 the CIA experienced the unparalleled loss of its of Soviet assets, which nearly destroyed the government's ability to gather intelligence on the Soviet Union. In this interview Mr. Spry discusses his personal involvement in the case as the FBI's lead investigator including many of the investigative methods they used. Hear never before details about the harrowing investigation to not only investigate and convict the highest ranking government official ever accused of spying, but to protect future Russian assets. In 1991, the quest led them to search for a Soviet spy in the CIA. They came to identify that spy as CIA Case Officer, Aldrich Hazan "Rick" Ames, a long-time CIA case officer and analyst. In February of 1994, Ames was arrested by the FBI and sentenced to life in prison.
Read More

risk-takers #2 Terry Fisher — Electronic Countermeasures

Have you ever stopped to ask yourself what it is about your business that is truly valuable? When you really think about it, any business with a product or service has something a competitor or adversary could use. And if you're being honest, you probably haven't fully considered all the ways they might get their hands on that information. You've spent years building your business, but all it takes is one bad day to compromise that dream. In this week's episode Brent sits down with FBI Special Agent (Ret.) and engineer Terry Fisher to discuss corporate espionage, electronic countermeasures (sweeps), bugging, and the common methods bad actors have used throughout history to gain access to proprietary information.
Read More

risk-takers #3 Surveillance Detection Routes (SDR)

Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It's a frightening thought. You've spent years building your business, but all it takes is one bad day to compromise that dream. In this week's episode Brent sits down with FBI Special Agent (Ret.) Dell Spry to discuss surveillance detection routes, what they are, and how they can be used as a spy detector device to find out if you are under surveillance.
Read More

SIGN UP FOR EXCLUSIVE INSIGHTS

Get the latest Chesley Brown insights and strategies directly in your inbox.

Sign Up Form Inline

  • This field is for validation purposes and should be left unchanged.