Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

Statistics Show Your Employees Might Be Mishandling Your Company Data

Statistics Show Your Employees Might Be Mishandling Your Company Data

 

How safe is your company’s data? According to a new survey released by tech giant Dell, there’s a large chance that it’s not very secure at all. The statistics revealed by the survey are dismaying, with the survey’s key finding was that 35 percent of employees report that it’s common practice to take proprietary company information when leaving their firm.

As bad as that is, the rest of the statistics in Dell’s survey were even worse. About 36 percent of employees regularly open emails from unknown, untrusted sources, making them extremely susceptible to threats such as phishing attacks.

Forty-five percent of employees admit to engaging in behaviors they know to be unsafe from a cybersecurity standpoint, including; using personal email accounts for work, misplacing company-issued devices and connecting to public WiFi to access confidential or proprietary information.

In addition, 72 percent of employees reported being willing to share proprietary, sensitive or confidential information under certain circumstances.

All of this paints a stark picture of a problem with no easy solution. The old saying is true; your employees are your greatest asset, and also your company’s biggest threat.

It’s easy, for example, to say that better employee education is the answer. While the exact scope and scale of the problem may not have been known before, it’s certainly no secret that phishing attacks aimed at rank and file employees have been a longstanding problem. To this point, few companies have bothered to attempt to better educate their employees.

Worse, the few that have haven’t seen much of an improvement.

In a similar vein, it would be easy to make the blanket statement that having a robust data policy in place would go a long way toward alleviating the problem. However, talking about it and actually developing and implementing such a policy has, at least to this point, proven to be a daunting undertaking.

 

KRACK Attacks: New Wi-Fi Vulnerability Found in WP...
Printer Costs Rising? Try These 4 Tips
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 18 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Privacy Best Practices Current Events malware backup technology solutions Productivity Hackers Business Management Ransomware cloud cyber attacks Software Business practice Innovation Business Continuity Mobility Disaster Recovery Microsoft Quick Tips Hardware Efficiency Office tips Business Computing Mobile Devices Network Security Windows 10 hardware solutions Computer Avoiding Downtime Internet business Flexibility data breach email Social Education Wi-Fi cyber criminals Operating System voip Laptop Health Law Enforcement phone systems Personal Information Identity Theft IT Mobile Computing Money Saving Money Information Technology Antivirus IT Services Smartphone Facebook History Risk Management Small Business Upgrade servers IT Support Office 365 data Application internet user Communication cloud capabilities Passwords Humor Miscellaneous byod Marketing Search Windows cars Virtual Reality Hosted Solutions Alert Internet Protocol Scalability Workplace Tips Encryption Apps Data recovery spam Wireless Update Automation Text Messaging Net worth hardware refreshes How To Employer-Employee Relationship Microsoft Office ecommerce time threats Managing Stress Artificial Intelligence Managed IT Services Cybercrime Server Gadgets virtualized servers Router Video Games Recovery iPhone holiday Battery Remote Computing Government business continuity plan ATMs Point of Sale downtime Password content Virtualization Automobile Software-based phone systems HaaS Legal Reputation BDR Worker Commute VoIP right End of Support Instant Messaging Work/Life Balance Internet Exlporer Robot VPN Advertising computer network Hosted Solution Relocation Smartphones Private Cloud Users Telephone Systems Social Media Black Market User Tips Telephony Touchpad Google PDF Entertainment USB Google Drive

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name