{"id":3362,"date":"2019-08-30T11:40:45","date_gmt":"2019-08-30T10:40:45","guid":{"rendered":"https:\/\/www.theproche.com\/?p=3362"},"modified":"2019-08-30T11:40:49","modified_gmt":"2019-08-30T10:40:49","slug":"securing-your-company-through-your-employees","status":"publish","type":"post","link":"https:\/\/www.theproche.com\/securing-your-company-through-your-employees\/","title":{"rendered":"Securing Your Company Through Your Employees"},"content":{"rendered":"\n

Employees are the main security\nvulnerability of any company, but they can also be its greatest defense against\ncyber threats. <\/p>\n\n\n\n

Currently, only a little more than half of employees receive cybersecurity policy training each year<\/a>, according to Clutch.<\/p>\n\n\n\n

Your company can safeguard its networks by\nregularly communicating, updating, and training employees about cybersecurity\npolicy.<\/p>\n\n\n\n

This article offers proactive tips for\nsecuring your company through your employees.<\/p>\n\n\n\n

Leadership Should Promote Cyber Security to Employees<\/h3>\n\n\n\n

Securing\nyour company starts with growing awareness about security threats and how your\ncompany addresses them. <\/p>\n\n\n\n

Only 52% of employees know if their company\nhas a cybersecurity policy. <\/p>\n\n\n\n

One reason why such a knowledge gap about\ncybersecurity policy exists at companies is because leaders fail to communicate\nabout cybersecurity at all, let alone its benefits. Without prompting,\nemployees are much less likely to download and install security software and\nabide by cybersecurity protocols. <\/p>\n\n\n\n

When employees do encounter cybersecurity\nregulations, it\u2019s most often through automated signals, such as password update\nreminders, internet restrictions, or user permission prompts.<\/p>\n\n\n\n

\"\"<\/figure><\/div>\n\n\n\n

More employees, then, recognize individual security measures<\/a> than a formal policy.\u00a0 <\/p>\n\n\n\n

Moreover, many employees exhibit\nsecurity-oriented behavior without being prompted by their employer. Nearly 80%\nof employees use password protection techniques. <\/p>\n\n\n\n

This disparity indicates that companies can\nbetter educate their employees about cybersecurity policy \u2013 and that\nemployees are receptive to these measures.<\/p>\n\n\n\n

To ensure maximal compliance and efficacy,\nbusinesses must educate employees about their role in cybersecurity on a\nregular basis.<\/p>\n\n\n\n

Employees Embrace Password\nProtections<\/h3>\n\n\n\n

Password protection is the cybersecurity\nelement that employees interact with most. <\/p>\n\n\n\n

This is because employees recognize the\nvalue of password protection, both on a personal and professional level. <\/p>\n\n\n\n

Most employees take the simplest approach\nto password protection by updating their passwords regularly.Regular password\nupdates are common because employees are accustomed to password updates and\ndoing so requires little effort. <\/p>\n\n\n\n

More complex forms of password protection, though, should be encouraged<\/a>. Protective measures such as\u00a0 multi-factor authentication and password manager software can create an extra layer of security.\u00a0 . <\/p>\n\n\n\n

Instruct Employees\nHow to Securely Use Personal Devices<\/h3>\n\n\n\n

Employees who use personal devices for work\npurposes pose a major security threat to companies. While a device itself isn\u2019t\ninherently risky, a device used carelessly can be.<\/p>\n\n\n\n

Bring-your-own-device (BYOD) and remote\nwork policies are viewed by many as benefits to a workplace. <\/p>\n\n\n\n

Though these initiatives provide more\nconvenience to employees, your company needs to weigh that benefit against the\nrisk they pose. <\/p>\n\n\n\n

The lack of awareness among workers about\ncybersecurity policy exacerbates the risk of a security breach.<\/p>\n\n\n\n

Using personal devices to access company\nemail or shared documents creates a vulnerability that your company may not\nhave direct control over.<\/p>\n\n\n\n

Employees expect to use their personal\ndevices for work, so companies should set realistic expectations for the safest\nway to use them. <\/p>\n\n\n\n

This is especially important because it\u2019s\noften \u201cnormal\u201d actions that lead to a security breach. <\/p>\n\n\n\n


\nFor example, accessing emails and shared documents is a normalized activity in\nthe modern workplace. This ease of access undercuts the perceived importance of\nsecurity measures and the perceived sensitivity of company data.<\/p>\n\n\n\n

Businesses must remind employees which data\nis sensitive and how to securely access shared documents via personal devices\nduring the routine flow of communications.<\/p>\n\n\n\n

Implement IT\nSecurity Training<\/h3>\n\n\n\n

Uninformed or careless employees are a\nleading cause of security vulnerabilities at companies. <\/p>\n\n\n\n

To mitigate these risks, your company needs\nto educate employees about your cybersecurity policy, updates to the policy,\nand how to use devices securely.<\/p>\n\n\n\n

IT security training doesn\u2019t have to be\nboring seminars or ritualized trainings. Experiment with cybersecurity training\nthat engage employees such as <\/p>\n\n\n\n