Blogs and Posts

How Poor Security Habits Lead to Data Breaches
- By: Garry Feldman
- Date: January 24, 2018
One of the most important factors in protecting your business’s data is ensuring that your employees are following the proper security protocol. Unfortunately, as a recent study found, a shocking number of employees have poor security habits that put their company’s data at risk.
If you’re interested in improving your business’s cybersecurity strategy, you need to learn how poor habits can lead to data breaches and how you can address this situation. Here is some information about improving security habits and tips for developing a stronger IT security strategy for your business.
Unauthorized Data Access
One of the biggest threats when it comes you your company’s IT security is having your data accessed by unauthorized users. While your primary concern is most likely defending your data from hackers, it’s also possible that your employees are also accessing data improperly, putting your entire system at risk.
A recent study of employee security habits found that 25% of those surveyed had tried to access work data that they were not allowed to use and that over 60% of these efforts were successful. This means that one of your primary goals in improving security habits is making it clear to your employees why they shouldn’t access unauthorized data and how doing so can put the entire network at risk.
Password Usage Facts
Password usage is another area where poor habits can lead to costly data breaches. There are several ways that employees are missing the mark when it comes to password usage, making it a good idea to examine this issue very closely.
A concerning issue regarding employees and passwords is the fact that over 40% of employees use the exact same passwords for their work and personal accounts, putting both at risk. Equally is alarming is that when a breach has occurred, 63% of employees changed only the breached account instead of updating the password on all of their accounts.
It has also been found that employees will routinely share their passwords, which can pose a big problem when an employee is terminated. Shockingly, it is estimated that over 90% of employees fail to regularly update their passwords, often leading to weak passwords that can easily be guessed by hackers.
If you’re interested in defending your company from data breaches, then it is crucial that you ensure your employees are using their passwords correctly. First, you should review with your employees the best way to create a strong password, emphasizing that all passwords need to be updated when a breach has been detected. Second, you must make it clear that usernames and passwords should never be shared, even with other employees. Finally, you should have a system in place to revoke network access for employees as soon as they have been terminated.
The best solution for improving security habits in your workplace is working with the IT experts at U.S. Computer Connection. Our professionals can help you institute a security policy that will defend your network from hackers and promote better security habits in your employees. We are your go-to IT security solution and can make sure that your data is protected.
White Papers
-
Ransomware E-book
The Business Guide to Ransomware.
-
IT Move: Soup to Nuts
Take a look for IT Move Project Planning.
Blog Archive
Blog Archives
- June 2019 (1)
- May 2019 (1)
- April 2019 (1)
- December 2018 (1)
- November 2018 (1)
- September 2018 (1)
- August 2018 (4)
- July 2018 (5)
- June 2018 (7)
- May 2018 (5)
- April 2018 (5)
- March 2018 (5)
- February 2018 (4)
- January 2018 (5)
- December 2017 (6)
- November 2017 (5)
- October 2017 (6)
- September 2017 (6)
- August 2017 (4)
- July 2017 (4)
- June 2017 (6)
- May 2017 (4)
- April 2017 (6)
- March 2017 (4)
- February 2017 (5)
- January 2017 (5)
- December 2016 (5)
- November 2016 (5)
- October 2016 (4)
- September 2016 (6)
- August 2016 (4)
- July 2016 (7)
- June 2016 (7)
- May 2016 (6)
- April 2016 (5)
- March 2016 (7)
- February 2016 (5)
- January 2016 (5)
- December 2015 (6)
- November 2015 (1)
- October 2015 (2)
- August 2015 (5)
Categories
- Backup and Disaster Recovery (12)
- Business IT (73)
- Security (5)
- Security Tips (71)
- Training (35)
- Uncategorized (5)
- Webinar (28)