Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.  
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  The biggest business security threat comes from within

The biggest business security threat comes from within

?????????????????????????????????????????

For all the concerns about hackers and scammers targeting your business, you’re actually most at risk from your own staff being oblivious to the consequences of their actions.

As major security breaches make the headlines more and more often, it’s tempting to think that the key to business cyber-security is reinforcing your external defences to keep out the bad guys. That’s certainly important, but a well-rounded business security strategy focuses just as much on the enemy within.

Of course there’s the occasional disgruntled employee with an axe to grind but simple human error or accidental loss by an employee is the biggest source of a potential data breach, according to security company Shred-it’s second annual Australian Information Security Tracker study.

Based on responses from more than 1,100 businesses across the country, the report paints a disturbing picture – with security risks typically coming down to inadequate staff training and poor implementation of information security policies and protocols. Despite half of all small business owners recognising this as an area of concern, almost a third either don’t have information security policies in place or haven’t sufficiently trained their staff on how to implement these policies.

A third of respondents to the survey insisted their business had absolutely no documents that would cause harm should they fall into the wrong hands through loss or theft. It’s pretty hard to believe that any organisation could walk away completely unscathed if it’s financial paperwork, customer database, employee records, supplier agreements and long-term strategic plans found their way to a competitor.

Shred-it advocates a “clean desk policy” to ensure paperwork doesn’t go astray, which isn’t surprising considering that they’re in the business of shredding confidential documents, but they raise a good point. Whether you’re dealing with piles of paper or folders full of digital files, it’s important to consider which staff need access to sensitive information and what processes you have in place to ensure this information doesn’t find its way out the office door.

Chances are you wouldn’t give every staff member the key to the office door or combination to the safe, not because you don’t trust them, but simply because it’s an unacceptable security risk. It’s important to take the same care when deciding who has access to your precious business information.

FacebookTwitterGoogle+Share

Recent News

ytm

In the world of online music streaming, there are a number of big-name players. Spotify is the best known, and Apple has its own play in Apple Music. Users of Google’s Android operating systems are probably more familiar with Google Play Music. Google’s approach to Google Play Music has always been an odd one from… More 

parentalcontrols

If you’ve got kids, you may well be concerned that they’re far more tech-savvy than you are. Having grown up with technology as an absolutely expected part of their lives, and with so much IT integrated into school curriculums through their education, it’s pretty easy to feel as though they’re well ahead of you. That… More 

win10update

If you’re using a Windows 10 PC, you’ve probably been alerted to the existence of what Microsoft’s calling the “April 2018 Update” to your operating system. This isn’t some kind of April fool’s joke, or for that matter an update only applicable to women called April, but instead the latest larger-scale update to Windows 10… More 

netflixlogo

The massive rise in popularity of streaming services, especially video streaming services such as Netflix, in recent years has had some astounding effects on the online world. There’s now such a thing as “peak” internet usage time, typically around 7pm-11pm each evening, simply because so many people are using that evening time to binge-watch their… More