Contact us today!

FRS Pros Blog

Help! My Staff Hates My Company’s IT!

Help! My Staff Hates My Company’s IT!

Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone.

More often than not, employees aren’t very aware of IT security threats or the ramifications of improper data-sharing habits. It’s not uncommon for IT security to start and end with the password for non-technical employees, and sometimes even that feels like asking a lot.

This point isn’t to sound negative. You probably didn’t hire most of your employees for their knowledge and understanding of network security. The real problem lies when you, the business owner, rolls out a new security policy. As a simple example, let’s go back to passwords:

A Real-World Example of Employees Rejecting IT Security
Let’s say your IT provider suggests that you set up group policies on your network to enforce secure passwords across the board. That includes forcing users to reset their network password every 30 days, not repeating the same password, and having complexity requirements.

If you are like most business owners, you approve the change and move on. IT implements the change, and suddenly your employees start getting prompted to change their passwords. It’s likely some users are going to simply follow the prompts and do so without a hitch, some are going to idly mutter about the change, and a few are going to protest it. This might not even get directly to you right away either - they’ll complain to their immediate manager or their friends around the water cooler. In the worst cases, seemingly simple security change can bring out the poison. When it does finally trickle up to C-level, it’s going to feel insane how much it has escalated. After all, it’s just over a simple password policy, and it is to protect the data of the business that signs their checks! I’m not even the victim of this and the idea heats me up too!

This is a little bit of an extreme case and not typically the norm, but I assure you it does happen. It’s worth mentioning some other policies that could rile up your employees:

  • BYOD (Bring Your Own Device) Policies - From employees not wanting their employer to dictate how they manage their personal mobile devices, despite setting up company email and cloud accounts to use the device for work, to bringing in unprotected devices and connecting them to the network, this security concept always seems to be a major hit or a major miss for people.
  • Firewalls and Content Filters - “What do you mean, YouTube is blocked?” You’d be surprised how many businesses suffer from wasted time from video streaming sites and social media, or maybe you wouldn’t. While common, it’s usually just a handful of provocateurs who regularly misuse the Internet while at work. Still, the solution is locking things down, and for some reason, that can be upsetting to some users.
  • Implementing New Technology - This is probably the most common. Let’s say you roll out a new line of business app or move your data to the cloud. You put your managers and staff through training to learn the new system and provide instructions for proper use and follow up a week or two later only to find some employees are following the new procedures and others are pushing against the grain and going their own way.

The list goes on though. Almost any kind of security implementation could potentially drum up murmurs from employees. Does your new VoIP system record calls and let managers barge in to help staff? Did you install an IP camera system to protect company assets (and potentially, your employees)? Are you blocking users from installing unauthorized software on company workstations to prevent software license nightmares? You name it, and someone will potentially be unhappy about it.

What’s the Fix? Are My Employees Working Against Me?
There’s good news. It’s pretty likely that your employees aren’t conspiring to take down your business. In fact, all this stress, flack, and frustration that business owners and managers receive is often because your users want to get their job done effectively.

Wait, what?

It all goes back to your employees not understanding the importance of security. Remember, to many, security starts and ends with the password, and that’s if you are lucky. To them, a new security policy or change to IT just feels like a roadblock. IT security just doesn’t seem reasonable to them. Imagine waking up one day and discovering that we switched measurement systems while you were asleep, and now you need to convert back and forth between miles and kilometers during your morning commute. Everything you’ve known is now wrong and that can be extremely taxing when you simply just want to accomplish a goal.

Even when the purpose of the change is to make the company more effective, a single user will only see it as something new to learn or an interruption to their day. Alternatively, some might look at it as being strong-armed to surrender their privacy (like the example of the BYOD policy) or that they aren’t trusted. It suddenly becomes a very personal thing for some users and then they rant about it around the water cooler and find other coworkers who feel burnt as well, and then it escalates.

If the core problem lies in your employees not being security minded, the fix becomes simple - be a megaphone for security.

It Starts with Leaders
When implementing new security policies, software, or technologies that will affect your employees and how they work, it’s important to loop in both the C-level and managers to go over the vision and goals. Sometimes, it’s as simple as a quick elevator pitch, and other times it doesn’t hurt to explain why things are changing. If management is on board, they will be equipped to educate and answer questions for the rest of the staff.

You Aren’t Looking for Acceptance
This doesn’t mean your IT decisions suddenly need to be democratic. When it comes to IT security and the protection of your company’s (and your clients’) data, this really isn’t up to your staff. The key is getting them on board and providing education to make security top of mind.

By setting up regular internal security meetings or adding IT security as a point to your regular staff meetings, you and your management team can help explain the why behind new policies and changes, and in a lot of cases, identify other issues that you might not be aware of. Plus, this encourages an ongoing culture of security, giving you and your team a platform to discuss and implement further training and help your users identify issues.

We realize not all business owners are fluent in IT security either, and we’re happy to help you establish a culture of security. If you need help implementing new technology, reach out to FRS Pros by calling 561-795-2000 to start protecting your business from the bottom up.

Backup and Recovery of Collaborative Environments
Getting to Know Technology: Hackers


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Tech Term Business Management Google Cloud Business Computing Software User Tips Microsoft Malware Computer Hackers Hardware Productivity Efficiency Browser Cybersecurity Mobile Devices Windows Hosted Solutions Data Backup Smartphone Internet of Things Cybercrime Innovation Apps Operating System Windows 10 Office 365 Data Recovery Data Security Android Email Backup IT Services Outsourced IT Smartphones VoIP Ransomware Mobile Device Management Vulnerability Phishing Data IT Support Money Business Business Continuity Alert Upgrade Disaster Recovery Law Enforcement Server Microsoft Office Employer-Employee Relationship Best Practice Applications Collaboration Network Chrome IT Support Saving Money Managed IT Services Communications App Cloud Computing Spam Telephone Systems Tech Support Router Gadgets Google Drive Blockchain Information Two-factor Authentication Small Business Windows 10 Managed Service Provider Managed IT Computers Information Technology Passwords Unsupported Software Virtualization Miscellaneous Wireless Technology Application The Internet of Things Social Media Word Data Management Encryption VPN iPhone Patch Management Wireless Charging Safety Google Docs Project Management Productivity Facebook Proactive IT Devices SaaS Holiday Sports Touchscreen Data Storage Risk Management Data Breach Quick Tips Hosted Solution WiFi Automation Avoiding Downtime Travel Mobile Device OneNote Password Managed Service Wi-Fi Excel Audit Update Fraud Shortcut Data Protection Mobile Security Hacking Politics Communication Bring Your Own Device Workplace Tips Artificial Intelligence Evernote Gmail Save Money BDR Google Assistant Government User Error Cost Management Managed IT Services Cortana Networking Augmented Reality Robot Users Budget WannaCry Commerce Conferencing Data Theft IT Solutions Data Privacy Windows 7 Legal Device Security Amazon Legislation Language Webinar Business Technology Administrator Antivirus Adobe Workers Gamification Software as a Service Streaming Media Accessory Lithium-ion battery Reputation Consultant Data storage Gifts Computing Hard Drive Display History Windows Ink Remote Monitoring Virtual Assistant Comparison IT solutions Testing Access Licensing Updates Memory Remote Computing Health Bandwidth Chromecast Outlook Computer Forensics Peripheral Emergency Microsoft Excel IT budget Point of Sale Settings Credit Cards App store iOS WIndows Server 2008 Chromebook Co-Managed Services Telephony Wireless Google Maps Spyware Alexa for Business Search Specifications Virus Windows 10s HBO Camera Internet Exlporer Mobility Microsoft Word Financial Screen Mirroring Laptop Identity Theft Computer Care Nanotechnology Management Access Control Transportation File Sharing Printing Telephone Uninterrupted Power Supply Private Cloud Apple Unified Threat Management Sales Proactive Solid State Drive Projects Tablets Maintenance Meetings Social Engineering Emails Cast Vendor Touchpad Vendor Management Sync Root Cause Analysis PowerPoint Admin Going Green Social Storage Scam FAQ Computer Fan Hyperlink Edge Upgrades Files Retail Websites Hard Disk Drive IT Management Identity DDoS NFL eWaste Hybrid Cloud Identities Marketing BYOD Employee-Employer Relationship Recovery Humor Samsung Wireless Internet Disaster Charger Value Wasting Time Data Loss Ciminal Benefits Phone System Personal Information Cache Save Time Computer Accessories PDF Training Monitors Twitter Battery Smart Technology Thank You Flexibility Music Mobile Computing Television CrashOverride Instant Messaging Hacker Text Messaging Company Culture Congratulations Scalability Analytics Entertainment Keyboard Office tips es Black Market Cleaning Automobile Office Advertising Big Data Managing Stress USB Worker Compliance How To Books Education Hiring/Firing End of Support Printers Video Games Experience HaaS Work/Life Balance Virtual Reality Relocation Regulation Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records