Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Employees are Your Biggest Cybersecurity Threat

Your Employees are Your Biggest Cybersecurity Threat

When it comes to cybersecurity, businesses have a lot to worry about, with the costs associated with protecting a network (or responding to failed attempts to protect your network) dominating these costs. While it is incredibly important to protect your business in any way possible, it is often not enough, and even the most careful companies fall victim to attacks.

According to the Federal Bureau of Investigation, cyberattacks increased about 400 percent between 2019 and 2020, hence the extreme focus on cybersecurity in recent years. Businesses in particular are at great risk, especially when factoring in how some employees have a blatant disregard for cybersecurity.

You can have the most secure systems in the world and they would still be vulnerable due to one or two employees handling network security in an improper way. This can be quite the frustration for IT staff. Here are some of the ways an employee might fail to keep their credentials secure and what you can do about it.

Employees as Attack Vectors

With the large shift to remote work over the past several years, the ways that many employees are going about their day has changed considerably, and so too has the way a business’ network is distributed. Unfortunately, those who don’t do everything they can to protect their organization’s network are often seen as ignorant or as a saboteur, even though the largest contributing factor to these issues with network security is, more or less, stress—something which is incredibly challenging to quantify, measure, and eliminate.

According to the Harvard Business Review, stress plays a significant role in how protected an organization remains against cyber attacks. The study found that two-of-three workers failed to stick to organizational cybersecurity policies at least once over the course of every 10 workdays. It was also found that employees simply ignore cybersecurity policies around five percent of the time. While it might seem inconsequential, consider the far-reaching impacts of major data breaches, and all of a sudden it is a very big deal.

We know what you’re thinking; why would an employee follow procedure most of the time, but not all of the time? The study found the following were direct indicators for why:

  • “To better accomplish tasks for my job.”
  • “To get something I needed.”
  • “To help others get their work done.”

Around 85 percent of respondents claimed one of the above as the reason for their non-compliance, willingly putting their organizations on the line just for the sake of getting something done. Most people within a business are not hired for their cybersecurity know-how; they are hired for very specific job duties and responsibilities, and they might see that cybersecurity gets in the way of that purpose every so often. Only three percent of all these cases are true defiance or sabotage, so it’s hard to blame employees for simply wanting to do their jobs well.

Redefining the Importance of Cybersecurity

Most employees are going to prioritize productivity over security procedures, but they just can’t win when they could potentially be labeled as ignorant or negligent for deliberately trying to maintain productivity rather than prioritize security. The unfortunate truth is that most training platforms and policies do not take into account these gray areas, which is why it’s so important for employees to be involved in the development of cybersecurity policies. By taking employee feedback into account, you can ensure security while also guaranteeing that your team has access to what they need to be productive and successful in the workplace. Managers also must work to ensure that the members of their team know about cybersecurity expectations so they can work toward meeting them.

If your business would like some assistance with developing or implementing productivity-friendly security solutions, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 29 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Cybersecurity Communication Managed Service Smartphone Data Backup Android Upgrade Smartphones AI VoIP Business Management communications Mobile Devices Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Information Artificial Intelligence Facebook Automation Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Server Remote Work Managed Service Provider Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Virtualization Business Technology Apps Two-factor Authentication Vendor Data Security Mobile Office Employer-Employee Relationship Networking Chrome Budget Mobile Device Management BYOD Apple Gmail App Managed Services Voice over Internet Protocol Tip of the week Computing Information Technology Hacker Office 365 HIPAA How To Applications Avoiding Downtime BDR Marketing Conferencing WiFi Access Control Risk Management Retail Computers Managed IT Services Office Tips Router Analytics Augmented Reality Website Storage Password 2FA Bring Your Own Device Help Desk Virtual Private Network Health Healthcare Big Data Operating System Document Management Cooperation Free Resource Project Management Windows 7 Customer Service Scam Microsoft 365 Data loss Solutions Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Monitoring Vendor Management Firewall Excel Physical Security Display Printer Going Green Paperless Office The Internet of Things Remote Workers Infrastructure Telephone Social Cybercrime Data Privacy YouTube Vulnerabilities Cryptocurrency Customer Relationship Management Images 101 Maintenance Telephone System Antivirus Cost Management Multi-Factor Authentication Mobility Virtual Desktop Hacking Data storage LiFi Presentation Outlook Wireless Technology Employees Money User Tip Modem Humor Integration Processor Robot Mobile Security Word Sports Holidays Mouse Supply Chain Smart Technology IT Management VPN Meetings Data Storage Administration Saving Time Video Conferencing Managed Services Provider Safety Virtual Machines Professional Services Computer Repair Managed IT Service Downloads Settings Printing Wireless Licensing Content Filtering iPhone Entertainment Machine Learning Telework Cyber security Lenovo Tech Trends Writing IBM Virtual Reality Knowledge Regulations CES Google Calendar Communitications Google Drive Customer Resource management Google Apps Server Management Data Analysis IT Maintenance Private Cloud Star Wars Microsoft Excel Supply Chain Management FinTech Superfish Business Intelligence Term Identity Theft Gamification 5G Staff Twitter Experience Social Networking Legislation IT Assessment Google Docs Unified Communications Shortcuts Value Bitcoin Fileless Malware Ransmoware Error Running Cable Competition Flexibility Organization Google Wallet Vendors Content Social Engineering Wearable Technology Remote Computing Motherboard Digital Security Cameras Comparison Smart Devices Health IT Be Proactive Memory Windows 8 Directions Workforce Laptop Assessment Permissions Remote Working User Data Breach Drones Threats Google Play Tablet Workplace Strategies Alert Videos Specifications Electronic Health Records Wasting Time Managed IT Microchip Meta File Sharing Halloween Internet Exlporer Dark Data Fraud IP Address Trend Micro Amazon Security Cameras Username How To Notifications Black Friday Software as a Service Managing Costs Hacks Outsource IT Travel Scary Stories Database IT Technicians Recovery eCommerce Techology Environment SSID Google Maps Media Fun Proxy Server Cookies Cyber Monday Hard Drives Surveillance Virtual Assistant Deep Learning Virtual Machine Small Businesses Unified Threat Management Tactics Hotspot Domains Mirgation Reviews Unified Threat Management Displays Medical IT Education Nanotechnology Refrigeration Development Transportation Hypervisor Mobile Computing Outsourcing Addiction Network Congestion Language Public Speaking Search Chatbots Lithium-ion battery Shopping Optimization User Error PowerPoint Management Best Practice Workplace Screen Reader Distributed Denial of Service Entrepreneur Employer/Employee Relationships Hiring/Firing Navigation Point of Sale Buisness Service Level Agreement Computing Infrastructure PCI DSS Identity Gig Economy Legal IT solutions Paperless Network Management Business Growth Bookmark Co-managed IT Tech Support Smart Tech Undo Internet Service Provider Teamwork Regulations Compliance Technology Care Evernote Download Monitors Alerts Cortana Memes Business Communications SQL Server Alt Codes Browsers Scams Websites Connectivity Break Fix Net Neutrality Financial Data History Hybrid Work Downtime Upload Electronic Medical Records Smartwatch Multi-Factor Security Application IT SharePoint Hosted Solution Social Network Human Resources Azure Typing Cables IoT Dark Web Procurement

Blog Archive