Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  The biggest business security threat comes from within

The biggest business security threat comes from within


For all the concerns about hackers and scammers targeting your business, you’re actually most at risk from your own staff being oblivious to the consequences of their actions.

As major security breaches make the headlines more and more often, it’s tempting to think that the key to business cyber-security is reinforcing your external defences to keep out the bad guys. That’s certainly important, but a well-rounded business security strategy focuses just as much on the enemy within.

Of course there’s the occasional disgruntled employee with an axe to grind but simple human error or accidental loss by an employee is the biggest source of a potential data breach, according to security company Shred-it’s second annual Australian Information Security Tracker study.

Based on responses from more than 1,100 businesses across the country, the report paints a disturbing picture – with security risks typically coming down to inadequate staff training and poor implementation of information security policies and protocols. Despite half of all small business owners recognising this as an area of concern, almost a third either don’t have information security policies in place or haven’t sufficiently trained their staff on how to implement these policies.

A third of respondents to the survey insisted their business had absolutely no documents that would cause harm should they fall into the wrong hands through loss or theft. It’s pretty hard to believe that any organisation could walk away completely unscathed if it’s financial paperwork, customer database, employee records, supplier agreements and long-term strategic plans found their way to a competitor.

Shred-it advocates a “clean desk policy” to ensure paperwork doesn’t go astray, which isn’t surprising considering that they’re in the business of shredding confidential documents, but they raise a good point. Whether you’re dealing with piles of paper or folders full of digital files, it’s important to consider which staff need access to sensitive information and what processes you have in place to ensure this information doesn’t find its way out the office door.

Chances are you wouldn’t give every staff member the key to the office door or combination to the safe, not because you don’t trust them, but simply because it’s an unacceptable security risk. It’s important to take the same care when deciding who has access to your precious business information.


Recent News


In terms of overall storage security, it’s generally tough to beat cloud-based backup, especially if your cloud provider of choice uses an array of storage locations. With the right provider, your files of choice can be backed up in multiple locations, so even if there’s a massive internet outage, or a fire or some other… More 


After starting out as a minor player, FttDP appears destined to play a key role in Australia’s National Broadband Network. The NBN has become a political football over the last few years, with the network design changing several times along the way. As a result it’s hard to know exactly what kind of connection will… More 


The changing of the seasons presents the perfect opportunity to get into good habits when it comes to keeping your business safe. We all have our annual rituals, like changing the batteries in the office smoke alarm when we adjust the clocks for daylight savings. Just like that smoke alarm, there are digital security issues… More 


The chances are pretty good that you’ve used the GPS (Global Positioning System) hardware at some point in the recent past, whether on a dedicated satellite navigation device such as a car-based system, or any of a number of GPS apps available for popular smartphone operating systems. It’s even the basis for popular gaming applications,… More