Info Advantage Blog

Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

Statistics Show Your Employees Might Be Mishandling Your Company Data

Statistics Show Your Employees Might Be Mishandling Your Company Data


How safe is your company’s data? According to a new survey released by tech giant Dell, there’s a large chance that it’s not very secure at all. The statistics revealed by the survey are dismaying, with the survey’s key finding was that 35 percent of employees report that it’s common practice to take proprietary company information when leaving their firm.

As bad as that is, the rest of the statistics in Dell’s survey were even worse. About 36 percent of employees regularly open emails from unknown, untrusted sources, making them extremely susceptible to threats such as phishing attacks.

Forty-five percent of employees admit to engaging in behaviors they know to be unsafe from a cybersecurity standpoint, including; using personal email accounts for work, misplacing company-issued devices and connecting to public WiFi to access confidential or proprietary information.

In addition, 72 percent of employees reported being willing to share proprietary, sensitive or confidential information under certain circumstances.

All of this paints a stark picture of a problem with no easy solution. The old saying is true; your employees are your greatest asset, and also your company’s biggest threat.

It’s easy, for example, to say that better employee education is the answer. While the exact scope and scale of the problem may not have been known before, it’s certainly no secret that phishing attacks aimed at rank and file employees have been a longstanding problem. To this point, few companies have bothered to attempt to better educate their employees.

Worse, the few that have haven’t seen much of an improvement.

In a similar vein, it would be easy to make the blanket statement that having a robust data policy in place would go a long way toward alleviating the problem. However, talking about it and actually developing and implementing such a policy has, at least to this point, proven to be a daunting undertaking.


KRACK Attacks: New Wi-Fi Vulnerability Found in WP...
Printer Costs Rising? Try These 4 Tips


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events Productivity technology solutions Hackers malware backup cyber attacks Business practice Software Business Management Ransomware cloud Business Continuity Mobility Disaster Recovery Microsoft Innovation Hardware Network Security Windows 10 Computer Avoiding Downtime Internet business Efficiency Quick Tips Mobile Devices hardware solutions Office tips Business Computing Operating System Flexibility Laptop data breach Health Law Enforcement Passwords Education cyber criminals Wi-Fi voip email Social phone systems IT Identity Theft Communication Antivirus Miscellaneous Humor Personal Information Risk Management Mobile Computing servers Money IT Support Information Technology Office 365 Saving Money data Application Automation internet user Smartphone IT Services Facebook History Small Business Upgrade cloud capabilities BDR byod Router cars iPhone Virtual Reality Government Scalability Internet Protocol Workplace Tips Encryption Data recovery Update spam Google Net worth Reputation How To emails HaaS hardware refreshes ecommerce Microsoft Office Marketing intel time threats Search Managing Stress Windows Hosted Solutions Alert Cybercrime Apps virtualized servers Wireless Video Games Text Messaging Recovery holiday Battery Employer-Employee Relationship Remote Computing business continuity plan ATMs Point of Sale Password downtime Artificial Intelligence Managed IT Services content Virtualization Automobile Server Legal Gadgets Software-based phone systems Relocation USB Smartphones Private Cloud Users Social Media Worker Commute VoIP right Instant Messaging Touchpad PDF Work/Life Balance Google Drive VPN computer network End of Support Telephone Systems Black Market User Tips Internet Exlporer Robot Telephony Entertainment Advertising Hosted Solution

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name