Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.  
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  The biggest business security threat comes from within

The biggest business security threat comes from within

?????????????????????????????????????????

For all the concerns about hackers and scammers targeting your business, you’re actually most at risk from your own staff being oblivious to the consequences of their actions.

As major security breaches make the headlines more and more often, it’s tempting to think that the key to business cyber-security is reinforcing your external defences to keep out the bad guys. That’s certainly important, but a well-rounded business security strategy focuses just as much on the enemy within.

Of course there’s the occasional disgruntled employee with an axe to grind but simple human error or accidental loss by an employee is the biggest source of a potential data breach, according to security company Shred-it’s second annual Australian Information Security Tracker study.

Based on responses from more than 1,100 businesses across the country, the report paints a disturbing picture – with security risks typically coming down to inadequate staff training and poor implementation of information security policies and protocols. Despite half of all small business owners recognising this as an area of concern, almost a third either don’t have information security policies in place or haven’t sufficiently trained their staff on how to implement these policies.

A third of respondents to the survey insisted their business had absolutely no documents that would cause harm should they fall into the wrong hands through loss or theft. It’s pretty hard to believe that any organisation could walk away completely unscathed if it’s financial paperwork, customer database, employee records, supplier agreements and long-term strategic plans found their way to a competitor.

Shred-it advocates a “clean desk policy” to ensure paperwork doesn’t go astray, which isn’t surprising considering that they’re in the business of shredding confidential documents, but they raise a good point. Whether you’re dealing with piles of paper or folders full of digital files, it’s important to consider which staff need access to sensitive information and what processes you have in place to ensure this information doesn’t find its way out the office door.

Chances are you wouldn’t give every staff member the key to the office door or combination to the safe, not because you don’t trust them, but simply because it’s an unacceptable security risk. It’s important to take the same care when deciding who has access to your precious business information.

FacebookTwitterGoogle+Share

Recent News

blueborne

Security used to be one of those factors that was hard-wired into any financial software product or generally security focused-application, but in recent years we’ve seen a massive growth in the number of exploits that attack other software vectors in order to gain control of, or access to a system. The latest potentially troublesome vulnerability… More 

fall

One of the key platforms for Microsoft’s Windows 10 operating system was that it was going to be a continuously iterated platform with major releases happening to a regular schedule. Unlike the service packs of old, these wouldn’t just be bug fixes and security patches, but the introduction of new features and services, meaning that… More 

ransomware

In the early days of computer security, viruses were largely destructive while often relaying self-aggrandising messages about their authors, or straight up offensive statements about precisely how stuffed your system now was, thanks to corruption of storage media, system BIOSes or other critical computer components. They were the brainchild of often bored and seriously immature… More 

note8

Samsung recently announced its latest premium smartphone, the Galaxy Note 8 at a flashy event in New York City, followed up very rapidly by opening up pre-orders for the device in Australia less than 24 hours later. That’s the fastest I think I’ve ever seen a newly announced device go to a sales channel, although… More