ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

With Great Power Comes a Greater Security Risk, Study Finds

With Great Power Comes a Greater Security Risk, Study Finds

Every user on your network adds an additional level of risk, whether it be risk of user error, making a mistake that causes a data breach, or worse. One would assume that a company’s biggest risk would come from an untrained employee that disregards security policies, but surprisingly, that’s not always the case. Research has shown that a company’s CEO along with the rest of its C-level executives are the greatest security risk.

There are multiple factors that go into this. Take for instance the sheer amount of sensitive data that a CEO has access to. Whereas an average employee may just have access to data pertaining to their job or their department, a CEO generally has carte blanche to access any data they desire.

Then there’s the fact that CEOs typically have a poor work-life balance. This means that they put in way more hours than the average employee. You don’t have to be an expert in risk assessment to understand that a user accessing a company’s network 60, 70, or even 80 hours each week is a far greater risk than a user that only accesses the network 40 hours per week.

Both of these factors contribute to another reason why CEOs make for such a large security risk: the mobile devices they carry. In an effort to always be connected to the office, a CEO’s mobile device may have unfettered access to company records and sensitive information--more so than an average employee’s personal device.

In the case of an employee that has separate mobile devices for their work and personal life (often a luxury that CEOs can’t enjoy), the risk of data leakage or a breach resulting from the device getting lost or stolen goes down dramatically. Alternatively, CEOs aren’t restricted to the office and this mobility increases the risk of being hacked outside the office, especially when it comes to using their mobile devices in venues that offer public Wi-Fi, like coffee shops, cafés, conference centers, airports, etc. Hackers know this and they go to great lengths to make public Wi-Fi hotspots traps for unsuspecting users. This is why CEOs should be wary about accessing public Wi-Fi, and why it’s preferable that CEOs even avoid public Wi-Fi altogether (unless you are using a secure VPN to access all of your data).

A 2017 security report by iPass confirms this risk of cyber-attacks at popular Wi-Fi hotspots. The report ranks the riskiest public venues as follows.

  • Coffee shops and cafés, 42 percent.
  • Airports, 30 percent.
  • Hotels, 16 percent.
  • Exhibition centers, 7 percent.
  • Airplanes, 4 percent.

How much time do your company’s C-level executives spend doing business from these locations? The more business that’s done using Wi-Fi at these locations, the more of a risk an executive or even a mobile employee is to your organization.

Finally, CEOs are in a category unto themselves when it comes to another risk: CEO whaling scams. This is where scammers spend time researching the lives and motivations of CEOs so they can specifically target them with scams from a variety of sources, including email, phone calls, traditional paper mailings, and whatever other means they can use to get in contact with a CEO. This is an extremely dangerous scam because, unlike traditional scams like spam messages where the same message gets sent to thousands of people (and it’s often easy to recognize that it’s a scam), a CEO whaling correspondence is personalized to play on a CEO’s deepest fears and desires. For the scammers that go after CEOs like this, the effort is worth the time investment, due to the simple fact that CEOs make for such lucrative targets.

So, there you have it. CEOs are one of a company’s biggest security risks. For your business, this means you’ve got to take additional measures to ensure the protection of your C-level executives. Generally speaking, the same security plan and policies that work for the average employee won’t cut it for an executive, which is something you need to take into account when coming up with your company’s security and BYOD policy. Need help protecting your company’s data? Give ClearView IT a call today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Mobile Devices Network Communication Data Recovery Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Disaster Recovery Covid-19 Passwords Holiday Apps Managed Service Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Data Management Internet of Things Remote Work Operating System Government Saving Money Gadgets Workplace Strategy Artificial Intelligence Networking Managed IT services Windows Business Technology Spam Mobile Device Management Information Bandwidth Server Remote Encryption WiFi App Blockchain Virtualization Two-factor Authentication Office 365 Budget History Apple Employee/Employer Relationship Information Technology Gmail Office Wi-Fi Conferencing Access Control Cybercrime Health Data Security Analytics Big Data BDR IT Management Training Hacker Employer-Employee Relationship Vendor Cost Management Compliance Patch Management Document Management Remote Computing Remote Monitoring Help Desk Voice over Internet Protocol Hacking Save Money Data loss Managed Services BYOD Money Computing Search... Best Practice Vendor Management Customer Service Unified Threat Management Hard Drive Applications Firewall Retail Augmented Reality Alert Word Vulnerabilities Legal IBM Hiring/Firing Website Outlook Project Management Password Data storage Mobile Office Social Engineering Windows 7 Cryptocurrency Meetings Mobility Free Resource Black Market Laptop Cleaning Mobile Computing Google Maps How To Scam Robot Marketing Running Cable Data Breach VPN Social Sports SaaS DDoS Storage Update Twitter iPhone Education Cortana Law Enforcement Monitoring End of Support Content Filtering Paperless Office Antivirus Windows 11 Healthcare Printer User Maintenance Router The Internet of Things Chrome Remote Workers Travel YouTube Virtual Reality Websites Managed Services Provider Vulnerability Office Tips Memory PowerPoint Excel Private Cloud Virtual Private Network Software as a Service Wireless Technology Administration eWaste Data Protection Presentation Current Events Specifications Politics Downtime IT Consultant Solutions Settings Safety Virtual Assistant Machine Learning Customer Relationship Management Integration Co-Managed IT Images 101 Solid State Drive Virtual Desktop Display Experience Entertainment Tech Terms Processor Chromebook Managed IT Drones Digital Employees Automobile Avoiding Downtime Disaster Taxes Holidays How To Multi-factor Authentication Microchip HIPAA Lithium-ion battery Flexibility Cooperation Video Conferencing Saving Time Physical Security Virtual Machines Hack Identity Theft Processors Computer Repair Notifications Unified Communications Computers Bitcoin Professional Services Telephone Google Docs Start Menu Bluetooth Computer Care Downloads Distributed Denial of Service Social Network Webcam Financial Data Uninterrupted Power Supply Public Speaking Business Mangement Data Analysis Risk Management Screen Reader IT Streaming Media Mobile Technology Botnet Cables Security Cameras Tablets Keyboard Google Apps Trends Customer Resource management Telework Devices Rental Service Electronic Payment Micrsooft Hard Drives Microsoft 365 Flash Fileless Malware Supercomputer intranet Smartwatch Communitications Tip of the week Google Calendar Procurement Company Culture Telephone Systems Virus Wireless Point of Sale Business Growth Shortcut Gamification Phone System Telephone System Motion Sickness Environment FinTech Regulations Heating/Cooling Google Drive Shortcuts Directions Social Networking CES Backup and Disaster Recovery IT Assessment Comparison Windows XP Supply Chain Management Desktop Value Banking Google Wallet Content Electronic Medical Records Organization Accountants Cyber security Messenger Knowledge Deep Learning Corporate Profile Telephony Be Proactive Employer Employee Relationship Database Smart Devices Television Remote Working Business Metrics Hosted Solution Cabling Computer Accessories Health IT G Suite AI Equifax Trend Micro Books Tablet Mouse Transportation Language VoIP Workplace Strategies Society Tracking Digital Security Cameras Tactics Electronic Health Records Hard Drive Disposal Wasting Time Staffing Username IP Address Visible Light Communication Web Server Startup eCommerce Freedom of Information Reading Modem Monitors SharePoint Navigation Windows 8 Digital Payment Videos Addiction Surveillance email scam Mobile Security Managing Costs Worker Displays Access User Tip Advertising Legislation News Relocation SSID Employer/Employee Relationships Work/Life Balance Time Management Troubleshooting Smart Technology Evernote Tech Support Public Cloud Media Network Management Development Virtual Machine Recovery Competition Spyware Proxy Server Reviews Emails Optimization Fake News Audit In Internet of Things LiFi Teamwork File Sharing Entrepreneur 2FA Service Level Agreement Computing Infrastructure Data Storage Device security Hypervisor Hacks Redundancy Documents Network Congestion Application Management Writing Cache Business Intelligence Shopping Wireless Headphones Microsoft Excel Reliable Computing Medical IT SQL Server Unified Threat Management Business Owner Supply Chain Tech Workers Paperless Going Green Business Cards Error PCI DSS Licensing Securty Domains Bookmark CCTV Gig Economy Humor Scalability Printing Internet Service Provider Piracy Administrator Azure Text Messaging Touchscreen Workplace Term Proactive IT Business Communications Download Computer Malfunction Regulations Compliance HTML Managed IT Service Bring Your Own Device Emergency Vendor Mangement Browsers Nanotechnology Memes Net Neutrality Software License Inbound Marketing Scams Google Play Music Samsung Human Resources Upload

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?