How to prevent data breaches is one of the most important aspects of security for a modern business.
It’s not just cyberattacks are growing in sophistication, it’s that too often employees are acting as a bottleneck for security policies put in place by companies.
By this, we mean that human error is one of the main reasons businesses fall victim to attack, and it doesn’t matter how many new solutions are implemented; if employees don’t understand their habits, then they can’t amend them and avoid being breached in the future.
52% of cyberattacks directly attributable to human error.
This is one of the reasons cybersecurity education is so important in business today—it helps remove some of these bottlenecks by teaching employees what to do, what to expect, what to look out for, and how to handle being the target of common attack vectors, like phishing.
We’ve put together this infographic to show you the most common and risky employee practices that threaten your data security. Take a look!
Cybersecurity is more important than ever, which is why we encourage continued awareness of the risks of cybercrime. To learn more, take a look at our managed cybersecurity services and discover what’s involved in a comprehensive defense strategy.
Infographic in Written Form
10 Riskiest Employee Practices That Threaten a Company’s Data Security
In today’s age of rising cyberattacks, it’s as crucial as ever for people to know which of their habits are risking a data breach. Impact’s IT experts have outlined the 10 riskiest employee security practices—how many of them apply to you?
- Accessing the Internet via public or unsecured wireless networks
- Sharing passwords with others
- Failing to delete unnecessary but protected information from computers
- Using the same login ID & password for multiple accounts
- Leaving computers unattended when away from workstations
- Using USB devices that have not been properly encrypted to store protected information
- Failing to notify organizations after losing USB drives that contain protected data
- Failing to use privacy screens when remotely working on protected data
- Carrying unnecessary sensitive information on laptops when traveling
- Using personally owned mobile devices to access the organizational network