Info Advantage Blog

Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

10 Common Security Mistakes to Keep an Eye On

10 Common Security Mistakes to Keep an Eye On


Most companies have to have a workforce, generally one of considerable size. Unfortunately, the more users you have, the more potential risks you run into. Of course, your workforce doesn’t collectively intend to be a security risk, but the digital world is a complicated place, with threats around every corner and malicious programs just waiting for your employed end-users to slip up. Here are ten such honest slip-ups to watch out for:

  1. Clicking on Risky Websites - The web is pretty big, so when an employee has been searching for something and finally manages to find a link, they might not always think about the source. As a result, your network and files could be subject to any number of threats. Be sure to emphasize to your employees that there is such a thing as “too good to be true,” especially on the Internet.
  2. Weak or Personal Passwords - As much as your employees might love their dogs, cars, or a particular date in time, a password is no place to express that love. Also, if they actually use “password” as their password, they are just begging for trouble. Encourage them to use private, randomized strings of numbers and letters as insistently and consistently as possible.
  3. Lax Habits in Mobile Security - You may have the latest versions of spyware and virus blockers on your company desktops, but do your employees have the same on their tablets, phones, and other portable electronics? Without the same security, once they are connected to your network, these devices leave your network wide open for breaches. Be sure your employees aren’t leaving points of access to your network without safeguards by establishing mobile device policies and a BYOD (Bring Your Own Device) policy.
  4. Using Insecure Connections to Access Sensitive Data - Are your employees reviewing company files on their lunch break by using the local fast food franchise’s free Wi-Fi? If they are, it is recommended that
     you put a stop to it; as public Wi-Fi hotspots are prone to have malware lurking about.
  5. Lost or Stolen Unencrypted Tech - So an employee is riding the bus to work, and leaves their company phone behind when they disembark. Without encryption software, that phone is potentially an encyclopedia of company data and information for sale to competitors, as well as a free pass into company files and email. Enforcing encryption policies helps to mitigate this risk.
  6. Shadow IT - An employee decides that they prefer a different program to perform their job-related task and downloads a copy of that program onto their company desktop without the knowledge of the IT department. Besides the question of compatibility with your systems, it spreads your company data into yet another system, but this time you don’t have control over it. Plus, there is always the risk that the download will come with a bonus - vulnerabilities that could allow malware to hitch a free ride into the network. Be vigilant regarding the use of unapproved, personally downloaded applications.
  7. Phishing Calls/Personalized Phishing Emails - One of your HR employees checks their email and finds what looks to be a job application directed specifically to them, using their name, title, and other personal identifiers. They click on the included link, not realizing that the email was actually from a hacker who did a bit of research on Facebook and LinkedIn, and downloads a mess of viruses. Impress upon your employees the importance of private social media accounts and the careful consideration of any linked content from unknown senders. Similarly, make sure your employees can recognize and appropriately handle phishing telephone calls for both live callers and robocalls, and understand the importance of not sharing company information compulsively.
  8. Personal Email Use - The news has presented enough evidence in recent years to prove that using a personal email account for work purposes is never a good idea. Beyond the implicit unprofessionalism of some usernames, personal accounts tend to be more vulnerable to malicious programs than their corporate counterparts are. Encourage your employees to keep work and personal emails separate.
  9. Leaving Workstations Unattended - As unfortunate as it is, not all employees will be completely on the up-and-up. Some will attempt to view information they aren’t cleared to access, often for purposes of corporate espionage. This task becomes remarkably easy when a workstation is left unattended while still active. The fix is relatively easy to establish; just remind employees to log off of their desktop (or at least lock it) before they leave their post, and enforce it appropriately.
  10. Using Random Memory Devices - It makes no sense to carefully craft your system defenses if your employees are going to find a random USB drive lying on the street and plug it into their workstation, subjecting your network and files to whatever malware might happen to be on the device’s storage.

While human error is impossible to avoid entirely, you can minimize your risk of a security breach by implementing these policies for your workforce and educating them on best practices. For more information about industry best practices when dealing with company data, give Info Advantage a call at (585) 254-8710.


Top Four IT Issues Every Business Should Be Aware ...
Moving Your Office? Make Sure Your Tech Can Handle...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 23 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Current Events Privacy technology solutions Hackers malware Productivity Software Business Management cyber attacks backup Business practice Ransomware Innovation Hardware cloud Network Security Business Continuity Mobility Microsoft Office tips Business Computing Efficiency Windows 10 Mobile Devices Computer Disaster Recovery Avoiding Downtime Internet hardware solutions business Quick Tips Flexibility data breach email Social Operating System Laptop Education cyber criminals Wi-Fi Health Law Enforcement Passwords Information Technology Saving Money Automation IT Smartphone IT Services Facebook History Antivirus Small Business Upgrade Risk Management servers IT Support Office 365 data Application internet user Communication voip Miscellaneous Humor Personal Information cloud capabilities Mobile Computing Money byod Wireless phone systems cars Virtual Reality Text Messaging Identity Theft Scalability Internet Protocol Workplace Tips Encryption Employer-Employee Relationship Data recovery Update spam Net worth Artificial Intelligence How To emails Managed IT Services hardware refreshes Server Gadgets ecommerce Microsoft Office intel time threats Managing Stress Router iPhone Cybercrime Government virtualized servers Video Games Google Recovery holiday Battery Reputation Remote Computing business continuity plan HaaS Point of Sale Password Marketing downtime content Search Virtualization Windows Automobile Alert Legal Software-based phone systems Apps End of Support Worker Commute VoIP right Internet Exlporer Instant Messaging Robot Work/Life Balance Advertising Hosted Solution Relocation Smartphones Users VPN Private Cloud computer network Social Media Touchpad PDF Telephone Systems ATMs Black Market User Tips Google Drive Telephony Entertainment Hosted Solutions USB BDR

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name