Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Employees are Your Biggest Cybersecurity Threat

Your Employees are Your Biggest Cybersecurity Threat

When it comes to cybersecurity, businesses have a lot to worry about, with the costs associated with protecting a network (or responding to failed attempts to protect your network) dominating these costs. While it is incredibly important to protect your business in any way possible, it is often not enough, and even the most careful companies fall victim to attacks.

According to the Federal Bureau of Investigation, cyberattacks increased about 400 percent between 2019 and 2020, hence the extreme focus on cybersecurity in recent years. Businesses in particular are at great risk, especially when factoring in how some employees have a blatant disregard for cybersecurity.

You can have the most secure systems in the world and they would still be vulnerable due to one or two employees handling network security in an improper way. This can be quite the frustration for IT staff. Here are some of the ways an employee might fail to keep their credentials secure and what you can do about it.

Employees as Attack Vectors

With the large shift to remote work over the past several years, the ways that many employees are going about their day has changed considerably, and so too has the way a business’ network is distributed. Unfortunately, those who don’t do everything they can to protect their organization’s network are often seen as ignorant or as a saboteur, even though the largest contributing factor to these issues with network security is, more or less, stress—something which is incredibly challenging to quantify, measure, and eliminate.

According to the Harvard Business Review, stress plays a significant role in how protected an organization remains against cyber attacks. The study found that two-of-three workers failed to stick to organizational cybersecurity policies at least once over the course of every 10 workdays. It was also found that employees simply ignore cybersecurity policies around five percent of the time. While it might seem inconsequential, consider the far-reaching impacts of major data breaches, and all of a sudden it is a very big deal.

We know what you’re thinking; why would an employee follow procedure most of the time, but not all of the time? The study found the following were direct indicators for why:

  • “To better accomplish tasks for my job.”
  • “To get something I needed.”
  • “To help others get their work done.”

Around 85 percent of respondents claimed one of the above as the reason for their non-compliance, willingly putting their organizations on the line just for the sake of getting something done. Most people within a business are not hired for their cybersecurity know-how; they are hired for very specific job duties and responsibilities, and they might see that cybersecurity gets in the way of that purpose every so often. Only three percent of all these cases are true defiance or sabotage, so it’s hard to blame employees for simply wanting to do their jobs well.

Redefining the Importance of Cybersecurity

Most employees are going to prioritize productivity over security procedures, but they just can’t win when they could potentially be labeled as ignorant or negligent for deliberately trying to maintain productivity rather than prioritize security. The unfortunate truth is that most training platforms and policies do not take into account these gray areas, which is why it’s so important for employees to be involved in the development of cybersecurity policies. By taking employee feedback into account, you can ensure security while also guaranteeing that your team has access to what they need to be productive and successful in the workplace. Managers also must work to ensure that the members of their team know about cybersecurity expectations so they can work toward meeting them.

If your business would like some assistance with developing or implementing productivity-friendly security solutions, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Upgrade Mobile Devices Managed Service communications Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Tech Term Remote Network Internet of Things Current Events Artificial Intelligence Facebook Productivity Automation Cloud Computing Covid-19 Gadgets Managed Service Provider AI Miscellaneous Remote Work Server Outsourced IT Information Holiday Encryption Spam Employee/Employer Relationship Compliance Windows 10 Office Data Management Business Continuity Government Training Windows 10 Bandwidth Blockchain Virtualization Wi-Fi Business Technology Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Chrome Networking Gmail Budget Apple BYOD Vendor App Employer-Employee Relationship Managed Services Voice over Internet Protocol Office 365 IT Support How To BDR WiFi Applications Access Control Computing Hacker Tip of the week Information Technology Avoiding Downtime Conferencing Marketing Healthcare Office Tips Analytics Augmented Reality Managed IT Services Storage Password Bring Your Own Device Big Data HIPAA Router Virtual Private Network Operating System Health Computers Help Desk Risk Management Website Retail Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Social Vendor Management Solutions Physical Security Going Green Display Printer Windows 11 Customer Service Paperless Office Infrastructure Cybercrime Monitoring 2FA Excel Document Management Remote Workers Maintenance Antivirus Word Downloads iPhone Outlook Licensing Money Vulnerabilities Entertainment Humor Data Privacy Safety Images 101 Sports Robot Mobility Telephone System Mouse Multi-Factor Authentication Cost Management Administration IT Management VPN Employees Meetings Integration Customer Relationship Management User Tip Modem Computer Repair Mobile Security Settings Processor Printing Wireless Content Filtering Holidays Hacking Presentation Data Storage YouTube Smart Technology Supply Chain Video Conferencing Cryptocurrency Wireless Technology Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Virtual Desktop Managed IT Service Data storage LiFi Hard Drives Download Net Neutrality Windows 8 Twitter Alerts SQL Server Technology Care Laptop Domains Financial Data Drones Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Refrigeration Upload Procurement Remote Computing Azure Hybrid Work Halloween Public Speaking Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Lithium-ion battery CES Tablet IoT Communitications Trends Supply Chain Management Hacks Entrepreneur Alert Scary Stories Fun Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Star Wars IT Assessment Deep Learning How To Microsoft Excel IT Maintenance Data Analysis Undo Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Travel Social Networking Education Google Maps Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Content Remote Working Mobile Computing Wearable Technology Memory Vendors Comparison Google Play Be Proactive Search Health IT Unified Threat Management Motherboard Data Breach Application Assessment Electronic Health Records Best Practice Permissions Workforce Unified Threat Management Directions Videos Wasting Time Threats Buisness Network Congestion Specifications Security Cameras Workplace Strategies IBM Legal Trend Micro IT solutions Internet Exlporer Software as a Service Business Growth Fraud Meta User Error Microchip Username Managing Costs Amazon Black Friday SSID Cortana Point of Sale eCommerce Database Surveillance Alt Codes Virtual Assistant Outsource IT Competition Network Management Tech Support IT Technicians Virtual Machine Environment Downtime Media Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Hosted Solution Tactics Development Typing Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays PowerPoint Knowledge Shopping Google Drive User Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Chatbots Navigation 5G Writing Distributed Denial of Service Workplace Experience IP Address Lenovo Gig Economy Google Docs Screen Reader Unified Communications Service Level Agreement Internet Service Provider Bitcoin Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Running Cable Server Management Regulations Compliance Google Wallet Private Cloud Identity Evernote Paperless Co-managed IT Superfish Bookmark Recovery Identity Theft Smart Tech Memes

Blog Archive