Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

Statistics Show Your Employees Might Be Mishandling Your Company Data

Statistics Show Your Employees Might Be Mishandling Your Company Data

 

How safe is your company’s data? According to a new survey released by tech giant Dell, there’s a large chance that it’s not very secure at all. The statistics revealed by the survey are dismaying, with the survey’s key finding was that 35 percent of employees report that it’s common practice to take proprietary company information when leaving their firm.

As bad as that is, the rest of the statistics in Dell’s survey were even worse. About 36 percent of employees regularly open emails from unknown, untrusted sources, making them extremely susceptible to threats such as phishing attacks.

Forty-five percent of employees admit to engaging in behaviors they know to be unsafe from a cybersecurity standpoint, including; using personal email accounts for work, misplacing company-issued devices and connecting to public WiFi to access confidential or proprietary information.

In addition, 72 percent of employees reported being willing to share proprietary, sensitive or confidential information under certain circumstances.

All of this paints a stark picture of a problem with no easy solution. The old saying is true; your employees are your greatest asset, and also your company’s biggest threat.

It’s easy, for example, to say that better employee education is the answer. While the exact scope and scale of the problem may not have been known before, it’s certainly no secret that phishing attacks aimed at rank and file employees have been a longstanding problem. To this point, few companies have bothered to attempt to better educate their employees.

Worse, the few that have haven’t seen much of an improvement.

In a similar vein, it would be easy to make the blanket statement that having a robust data policy in place would go a long way toward alleviating the problem. However, talking about it and actually developing and implementing such a policy has, at least to this point, proven to be a daunting undertaking.

 

KRACK Attacks: New Wi-Fi Vulnerability Found in WP...
Printer Costs Rising? Try These 4 Tips
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events malware backup Productivity technology solutions Hackers Software cyber attacks cloud Business Management Business practice Microsoft Innovation Hardware Mobility Business Continuity Disaster Recovery Ransomware Efficiency Office tips Business Computing Network Security Mobile Devices Windows 10 Avoiding Downtime Quick Tips business Computer Internet hardware solutions Flexibility Wi-Fi Social Saving Money Education Health email cyber criminals Operating System Law Enforcement Laptop data breach IT IT Services voip History Application Miscellaneous Antivirus Upgrade internet user IT Support Money Office 365 Small Business Facebook Communication servers data cloud capabilities Identity Theft Information Technology Humor Personal Information Smartphone Passwords Mobile Computing Risk Management Marketing ATMs Apps spam Wireless content Scalability Data recovery Text Messaging Managing Stress Automation iPhone Update Net worth Employer-Employee Relationship Software-based phone systems cars How To ecommerce Artificial Intelligence Server Managed IT Services phone systems Government Workplace Tips Battery Internet Protocol Search Cybercrime Router Point of Sale hardware refreshes Reputation business continuity plan Automobile Video Games time threats Recovery downtime BDR Gadgets Remote Computing Virtualization HaaS Password virtualized servers holiday Virtual Reality byod Microsoft Office Alert Legal Hosted Solutions Encryption Windows

Blog Archive

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name