Contact us today!

FRS Pros Blog

Some Employees are More Hackable than Others

Some Employees are More Hackable than Others

Habits can be a very effective way to improve your internal productivity, but others can expose your business to security risks. Unfortunately, there’s a good chance that your employees may have picked up the latter. This means you need to learn what to look for, so you can identify any problem areas within your business - and work to break the habits that led to these problems.

Habit 1: Too Few, Too Weak Passwords

This habit is a particularly bad one, as an employee with a weak password can potentially undermine your entire organization’s security. While nobody likes having to remember a different, complex password for every account they have, many users will default to reusing one password. What’s worse, these passwords are often very simple - simple enough for a hacker to decipher will little trouble. While some will require a little detective work on the hacker’s part, like a personal detail that can be found somewhat easily, an unfortunate number will use something too easy, like “password” or “12345.”

You need to hold your staff to a higher standard. In addition to establishing minimum password requirements, make sure these passwords are updated regularly. If remembering these passwords proves to be a challenge, suggest alternatives, like a password management solution or using passphrases.

Habit 2: On Top of Having Too Few, Too Weak Passwords, Sharing Them

One thing that all of your employees will have in common? Whether you call it “being efficient” or “cutting corners,” they will always be on the lookout for ways to simplify their work processes. One simple way (in their eyes) to do so? Sharing credentials!

Now, for the record, this isn’t in reference to company-owned accounts that are often set up, such as company social media accounts and shared resources. However, since these should be managed by (surprise, surprise) the company, these aren’t really applicable to our considerations.

The main takeaway here is that anyone in your company could create a very bad situation through the wrong actions, and any safeguards you have (such as password protection) are in place to keep the company safe.

Habit 3: Storing Company Files in Personal Storage Solutions

While cloud computing provides a vast amount of value and utility for businesses, there are also a few concerns you need to be aware of. For instance, it isn’t uncommon for employees to utilize their own personal cloud solutions to store company files.

It is important to address the fact that their motives for doing so are oftentimes pure. If an employee wants to commit a little extra time to a project, they very well may simplify things for themselves by sharing a company document with their personal cloud account. However, by doing so, this employee is also taking this document out from behind the protections your company should have in place for its data. This simply should not be done, despite the good intentions that motivate your employees - after all, we all know what they say about good intentions. Fortunately, there are solutions out there to allow your employees to safely access work materials, boosting their productivity without undermining your data security.

Habit 4: Introducing Shadow IT

Shadow IT is software (or hardware) that has been installed (or implemented) on your business’ solutions without the knowledge or approval of IT. This usually happens when your employees are unfamiliar with the solutions you provide to them, so they instead seek out an alternative that they prefer to use. Unfortunately, shadow IT is often the cause of severe issues, so your users need to be compliant to a policy of clearing any technology not provided by IT past IT, helping ensure nothing problematic pops up.

Habit 5: Carelessness While Using Email

Businesses have embraced the advantages of email since it was first introduced, streamlining and accelerating communication. However, these advantages have also come with a few serious risks - and the same goes for file sharing services, too.

Consider what could potentially happen if the wrong information was shared with the wrong person. This means that everyone in a business needs to be aware of the tradeoffs that email and file sharing both present: while collaboration is much easier, it is also easier for data to leak. In order to keep your data where it belongs, your entire team needs to remain aware of this fact.

“Habit” 6: Insufficient Training

This one isn’t so much a habit on the employee’s part as it is on the employer’s. Simply put, your business is going to be vulnerable to security threats if your employees aren’t aware of what threats are out there, and how to spot them.

This is why security training needs to be an integral part of every step in an employee’s career trajectory - starting from the onboarding process and continuing in perpetuity. There are plenty of methods that should be leveraged in order to do so, from phishing tests, team discussions, and other means of evaluating where more training is needed.

FRS Pros can help you with these evaluations, as well as the training that follows. To learn more, reach out to us at 561-795-2000.

Four Essential Business Software Types to Consider
Tip of the Week: Organization Inside Windows 10

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Internet Hackers User Tips Software Microsoft Google Cloud Innovation Efficiency Hardware Data Computer Business Management Windows 10 Hosted Solutions Email Communication Smartphones Tech Term Malware Mobile Devices Cybersecurity Data Backup IT Services IT Support Business Disaster Recovery Backup Small Business Android Office 365 Smartphone Data Recovery Browser Workplace Tips Upgrade Outsourced IT VoIP Internet of Things Gadgets Windows Users Communications Cloud Computing Collaboration Phishing Apps Information Data Security Business Continuity Managed IT Services Ransomware Automation Network Cybercrime Saving Money Operating System Miscellaneous Managed Service Mobile Device Management Microsoft Office Facebook Alert Server Passwords Law Enforcement Social Media Blockchain Two-factor Authentication Vulnerability Health Employer-Employee Relationship Wireless OneNote Money Artificial Intelligence Information Technology Covid-19 Mobile Office Spam Best Practice Holiday Quick Tips Applications Networking Chrome IT Support Virtualization Managed IT Services Managed IT Data Breach Bandwidth Unsupported Software Augmented Reality BYOD Telephone Systems Access Control App Tech Support Printing Bring Your Own Device Password Router Retail Data Storage Google Drive Settings Hacking Mobile Device Conferencing Windows 10 Windows 7 Word Gmail Save Money Patch Management Project Management Computers Managed Service Provider IT Management Cost Management Wireless Technology Paperless Office Robot Data Management Payment Cards Marketing WannaCry Travel Commerce Excel Management The Internet of Things File Sharing Application Productivity VPN HIPAA iPhone Fraud Encryption Sports Mobile Security Safety Vendor History Proactive IT Evernote Telephony SaaS Google Assistant User Error Remote Workers Risk Management Hybrid Cloud Touchscreen Voice over Internet Protocol Hosted Solution WiFi Cortana Avoiding Downtime Mobility Search Data Loss Wi-Fi Business Technology Audit Update Data Protection Wireless Charging Politics Meetings Google Docs Shortcut Software as a Service Hard Drive Display Going Green Social Devices BDR Budget Government Human Resources Hard Disk Drive Facebook Privacy Outlook Computer Forensics Peripheral Windows Server 2008 R2 Microsoft Excel IT budget Education YouTube Credit Cards App store Administrator Samsung Chromebook Co-Managed Services AI Google Maps Spyware Alexa for Business Scams Humor Streaming Media Camera Microsoft Word Lithium-ion battery Financial Payroll Firewall PCI DSS Specifications Virus Employees eCommerce IT Solutions Personal Information Legal Workstation Antivirus Access Telephone Smartwatch Apple Employee Webinar Virtual Private Network Proactive Chromecast Projects Training Hosted Desktop Reputation Tablets Maintenance Security Cameras Consultant Processor Regulations Compliance Sales OneDrive Fiber Optics Sync PowerPoint Admin Development Data storage Remote Monitoring Telework Storage Social Engineering Battery FAQ Internet Exlporer Hyperlink Server Maintenance Remote Computing Remote Work Edge Instant Messaging Hacker Compliance Break/Fix IT solutions Websites Identity Printers Smart Devices NFL eWaste Emergency Machine Learning Benchmarks Policy Employee-Employer Relationship iOS Holidays WIndows Server 2008 Uninterrupted Power Supply Wireless Internet Saving Time Micrsosoft Audits Identities Point of Sale HBO Charger Entertainment Value Wasting Time Investment Net Neutrality Ciminal Keyboard Medical IT Windows 10s Managed IT Service Data Theft Identity Theft Data Privacy Computer Care Sabotage Transportation Nanotechnology Troubleshooting Device Security Amazon Downtime Myths Laptop Screen Mirroring Procedure Office Copiers Private Cloud Adobe Workers Gamification Keyboard Shortcuts Unified Threat Management Business Intelligence Solutions Legislation Language Solid State Drive Managed Services Provider DDoS Accessory ROI Internet Service Provider Files 5G Gifts Computing Recovery Vendor Management PC Root Cause Analysis CRM Windows Ink Disaster Virtual Assistant E-Commerce Emails Threats Touchpad Cast Scam Testing Computer Fan Inventory Licensing Updates Memory Upgrades Digital Signage Printer Comparison HaaS Video Games Experience End of Support Hiring/Firing Work/Life Balance Relocation Virtual Reality Crowdsourcing Employer Employee Relationship Communitications Current Events Electronic Medical Records es Thank You Phone System Cache Benefits Save Time Computer Accessories Monitors PDF Mobile Computing Congratulations Flexibility Music Smart Technology Television CrashOverride Company Culture Text Messaging Scalability Analytics Regulation Black Market Cleaning Office tips Big Data Advertising Automobile Twitter Managing Stress USB Worker How To Books