Factors Driving Employees as Cybersecurity Risks
Securing cyber assets has become a priority to-do job in all business models with the IT department making strides in the same directions. But observations project that most of the efforts are restricted to safeguarding assets from external attacks, whereas, internal attacks make assets equally vulnerable. Most domestic attacks are carried out by employees within the organizations unknowingly. Employees’ being a part of the security system gives hackers an easy gateway to breach central data repository to carry out malicious activities. Businesses opting cloud platforms is one major reason behind the same as employees are veering towards remote operation making them move out of organizations IT security system.
• Lack of Awareness: Usually non-technical employees are not aware of burgeoning threats and methods to combat them. They have no details on cybersecurity measures and factors affecting it. Practices applied by such employees to utilize organization resources, increase the threat attacks.
• Phishing Mails: Old yet effective method of hackers to breach in. Employees with low technical knowledge are the main cohort that gets trapped in the phishing scam. Phishing mails are emails demanding sensitive information and appear to be sent by a legitimate company. Else, they might contain links to a malicious fake website of notable ones and seems very believable one. Signs of phishing mail are not addressing receiver by name, sender’s address is doubtful, typing errors, and persuading one to open provided links. It is advisory to contact IT cell in case of doubts.
• Accessing Unsecured Networks: Public Wi-Fi is the biggest lure for employees, hackers utilize them as bait to trap. Usually, employees operating outside the premise connect mobile devices with public Wi-Fi to carry on with the work giving malware an invite invade organization’s database. Instead, companies must provide them with personal mobile Wi-Fi routers or get paid VPN service activated on the company’s devices to act as an extra layer of security.
• Installing Illegitimate Applications: A common habit where employees install illegitimate software on the company’s device either for organizational use or personal use. Such applications have high chances of being infected with malware. It advisory to cross-check the legitimacy of applications before installing them and only download them from official app stores.
By Tom Farrah, CIO & SVP, Dr Pepper Snapple Group
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Phil Jordan, CIO, Telefonica
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Dennis Hodges, CIO, Inteva Products
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sven Gerjets, SVP-IT, DIRECTV
By Marie Blake, EVP & CCO, BankUnited
By Lowell Gilvin, Chief Process Officer, Jabil
By Walter Carvalho, VP & Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Marc Jones, Distinguished Engineer, IBM Cloud Infrastructure