ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Employees are Your Biggest Cybersecurity Threat

Your Employees are Your Biggest Cybersecurity Threat

When it comes to cybersecurity, businesses have a lot to worry about, with the costs associated with protecting a network (or responding to failed attempts to protect your network) dominating these costs. While it is incredibly important to protect your business in any way possible, it is often not enough, and even the most careful companies fall victim to attacks.

According to the Federal Bureau of Investigation, cyberattacks increased about 400 percent between 2019 and 2020, hence the extreme focus on cybersecurity in recent years. Businesses in particular are at great risk, especially when factoring in how some employees have a blatant disregard for cybersecurity.

You can have the most secure systems in the world and they would still be vulnerable due to one or two employees handling network security in an improper way. This can be quite the frustration for IT staff. Here are some of the ways an employee might fail to keep their credentials secure and what you can do about it.

Employees as Attack Vectors

With the large shift to remote work over the past several years, the ways that many employees are going about their day has changed considerably, and so too has the way a business’ network is distributed. Unfortunately, those who don’t do everything they can to protect their organization’s network are often seen as ignorant or as a saboteur, even though the largest contributing factor to these issues with network security is, more or less, stress—something which is incredibly challenging to quantify, measure, and eliminate.

According to the Harvard Business Review, stress plays a significant role in how protected an organization remains against cyber attacks. The study found that two-of-three workers failed to stick to organizational cybersecurity policies at least once over the course of every 10 workdays. It was also found that employees simply ignore cybersecurity policies around five percent of the time. While it might seem inconsequential, consider the far-reaching impacts of major data breaches, and all of a sudden it is a very big deal.

We know what you’re thinking; why would an employee follow procedure most of the time, but not all of the time? The study found the following were direct indicators for why:

  • “To better accomplish tasks for my job.”
  • “To get something I needed.”
  • “To help others get their work done.”

Around 85 percent of respondents claimed one of the above as the reason for their non-compliance, willingly putting their organizations on the line just for the sake of getting something done. Most people within a business are not hired for their cybersecurity know-how; they are hired for very specific job duties and responsibilities, and they might see that cybersecurity gets in the way of that purpose every so often. Only three percent of all these cases are true defiance or sabotage, so it’s hard to blame employees for simply wanting to do their jobs well.

Redefining the Importance of Cybersecurity

Most employees are going to prioritize productivity over security procedures, but they just can’t win when they could potentially be labeled as ignorant or negligent for deliberately trying to maintain productivity rather than prioritize security. The unfortunate truth is that most training platforms and policies do not take into account these gray areas, which is why it’s so important for employees to be involved in the development of cybersecurity policies. By taking employee feedback into account, you can ensure security while also guaranteeing that your team has access to what they need to be productive and successful in the workplace. Managers also must work to ensure that the members of their team know about cybersecurity expectations so they can work toward meeting them.

If your business would like some assistance with developing or implementing productivity-friendly security solutions, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Covid-19 Passwords Holiday Disaster Recovery Apps Windows 10 IT Support Browser Managed Service Miscellaneous Cloud Computing Outsourced IT Remote Work Data Management Managed Service Provider Internet of Things Government Saving Money Operating System Gadgets Workplace Strategy Networking Windows Artificial Intelligence Managed IT services Bandwidth Encryption Remote Blockchain App Virtualization Business Technology Spam Information WiFi Mobile Device Management Server Apple Information Technology Gmail History Employee/Employer Relationship Office Two-factor Authentication Office 365 Budget Cybercrime Data Security BDR Big Data Health Conferencing Analytics Wi-Fi Access Control Compliance Patch Management Cost Management Remote Monitoring Employer-Employee Relationship Help Desk Document Management Hacking Save Money IT Management Voice over Internet Protocol Training Remote Computing Hacker Vendor Vendor Management Hard Drive Augmented Reality Word IBM Search... Best Practice Website Project Management Legal Data loss Retail Alert Data storage Hiring/Firing Outlook Mobile Office Password Managed Services Money Applications BYOD Customer Service Unified Threat Management Computing Firewall Vulnerabilities Monitoring Mobile Computing iPhone Healthcare Education Paperless Office Cortana Marketing Antivirus Running Cable Content Filtering Twitter Maintenance Law Enforcement End of Support Storage Router Windows 11 Printer Websites The Internet of Things YouTube Mobility Meetings Travel User Virtual Reality Google Maps Laptop Remote Workers Social Engineering Scam Cryptocurrency Black Market Data Breach Windows 7 Free Resource Cleaning VPN Chrome Robot How To Social Update Sports SaaS DDoS Multi-factor Authentication Images 101 Taxes Presentation Integration Display Disaster Specifications IT Consultant Chromebook Drones Automobile Saving Time Employees Customer Relationship Management Lithium-ion battery Physical Security Co-Managed IT Avoiding Downtime How To Computers Entertainment Bitcoin Holidays Microchip Telephone Processors Flexibility Start Menu Cooperation Downloads Computer Care Video Conferencing Hack Identity Theft Excel Virtual Machines Notifications Vulnerability Unified Communications Computer Repair Software as a Service Data Protection HIPAA Professional Services Google Docs Bluetooth Wireless Technology Distributed Denial of Service eWaste Virtual Assistant Office Tips Memory Private Cloud Managed Services Provider Downtime Safety Virtual Private Network Processor Virtual Desktop Politics Tech Terms Current Events Settings Experience Machine Learning Managed IT Digital PowerPoint Solutions Administration Solid State Drive Access Smart Devices Books Language Workplace Strategies Proxy Server Society Time Management Emails Public Cloud Fake News Remote Working Computing Infrastructure AI Phone System Trend Micro Service Level Agreement Management Visible Light Communication Spyware Device security Digital Security Cameras Electronic Health Records Reading Transportation Monitors Audit Competition Wasting Time Windows 8 Wireless Headphones File Sharing Recovery Microsoft Excel Business Cards eCommerce Tech Modem Redundancy Going Green Displays Error Advertising Cache LiFi Videos Surveillance Relocation Entrepreneur Application Computer Accessories Managing Costs Work/Life Balance Smart Technology Bookmark Tech Support Unified Threat Management Workers Documents Piracy Business Intelligence Term SSID Download Printing HTML Media CCTV Development Employer/Employee Relationships In Internet of Things Virtual Machine Browsers Touchscreen Nanotechnology Securty Software License Reviews Computer Malfunction Domains Optimization Hacks Google Play Network Congestion Emergency Upload Writing Social Network Vendor Mangement 2FA Reliable Computing Teamwork Data Storage Hypervisor Supply Chain Data Analysis Screen Reader Samsung Uninterrupted Power Supply Mobile Technology Shopping Webcam Security Cameras Medical IT Trends SQL Server Customer Resource management Business Mangement Devices Paperless Troubleshooting Scalability PCI DSS Administrator Public Speaking Licensing Text Messaging Workplace Fileless Malware Proactive IT Tablets Tip of the week Streaming Media Company Culture Gig Economy Humor Bring Your Own Device Gamification Azure Google Calendar Telephone System Regulations Business Communications Supercomputer Internet Service Provider Keyboard Regulations Compliance Hard Drives Managed IT Service Scams Directions Music Virus Backup and Disaster Recovery Desktop Motion Sickness Memes intranet Content Comparison Electronic Medical Records Google Drive Accountants Human Resources Wireless Business Owner Net Neutrality Shortcut Financial Data Botnet Heating/Cooling Environment Cables Database Corporate Profile Windows XP Risk Management IT Rental Service Social Networking Micrsooft Knowledge Flash Television Health IT Telephony Equifax Google Apps Employer Employee Relationship Hard Drive Disposal Telework Telephone Systems Point of Sale Business Growth Tactics Cabling Username Tablet Smartwatch G Suite Communitications Microsoft 365 Mouse Shortcuts VoIP Startup Tracking Inbound Marketing Freedom of Information Procurement email scam FinTech Banking Navigation Google Wallet Addiction Mobile Security CES Web Server IT Assessment Messenger Deep Learning Value SharePoint Be Proactive User Tip Legislation Digital Payment Staffing News Supply Chain Management Electronic Payment Organization IP Address Cyber security Business Metrics Evernote Hosted Solution Network Management Worker

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?