Are Your Employees’ Bad Habits Putting Your Company at Risk?

ATLANTA--()--Are employees’ poor security habits putting your company data at risk? Your employees don’t usually intend to be a weak link, but clear guidelines are needed to protect your network, advises Trey Hawkins, chief technology officer for Leapfrog Services (www.ribbit.net). Hawkins helps businesses implement the latest technology platforms needed to increase productivity and reduce risk.

“Lines are now blurred between using company computers vs. personal devices for work,” Hawkins said. “And as we learned with recent celebrity hacking incidents, even cloud-based platforms can be compromised. It is critical to have rules in place that protect company information.” Five common threats:

1) Password Protection: When employees write passwords on sticky notes or don’t log out of their computers, company data is at risk. Not every employee has the same security clearance and not everyone walking around your office is an employee. Establish firm security practices, especially if employees share work stations.

2) Social Overshares: Updating social media sites with the latest tidbit seems harmless enough. But an ill-timed comment about a project, product, client or co-worker may come back to haunt you. Social media posts can be difficult to un-do once done. A clear social media policy should outline what to share and what to keep confidential.

3) Texting Trouble: Texting is often overlooked when it comes to company security. If employees use personal devices to conduct business you lose the security already in place for company properties. Sending links, images and quick thoughts by text is handy but may fall outside of what your IT department can control or access.

4) Gone Phishing: Occasionally phishing emails make it to inboxes even with have anti-malware and firewall protections. There are just too many emails opened by mindless clicking or carelessness, and too many clever hackers looking for opportunities to strike. Clarify which emails can be opened on company-owned devices, and update systems frequently to stay on top current threats.

5) Efficiency Exposure: Cloud-based platforms, file-sharing sites, thumb drives, and working via unsecure home networks might make employees more efficient, but these methods can put your intellectual property at risk. Balance efficiency with network security; choose systems that are safe for your company and convenient for your employees.

Learn more from Leapfrog: 866-870-2124 or www.ribbit.net

Contacts

For Leapfrog Services
Louise Mulherin, 404-405-1070
louise@mulherinpr.com

Release Summary

Are employees’ poor security habits putting your company data at risk? Trey Hawkins, CTO of Leapfrog Services, outlines five common threats to IT networks that companies need to manage.

Contacts

For Leapfrog Services
Louise Mulherin, 404-405-1070
louise@mulherinpr.com