croom new

Patriot Tech Services Inc. Blog

Some Employees are More Hackable than Others

Some Employees are More Hackable than Others

Habits can be a very effective way to improve your internal productivity, but others can expose your business to security risks. Unfortunately, there’s a good chance that your employees may have picked up the latter. This means you need to learn what to look for, so you can identify any problem areas within your business - and work to break the habits that led to these problems.

Habit 1: Too Few, Too Weak Passwords

This habit is a particularly bad one, as an employee with a weak password can potentially undermine your entire organization’s security. While nobody likes having to remember a different, complex password for every account they have, many users will default to reusing one password. What’s worse, these passwords are often very simple - simple enough for a hacker to decipher will little trouble. While some will require a little detective work on the hacker’s part, like a personal detail that can be found somewhat easily, an unfortunate number will use something too easy, like “password” or “12345.”

You need to hold your staff to a higher standard. In addition to establishing minimum password requirements, make sure these passwords are updated regularly. If remembering these passwords proves to be a challenge, suggest alternatives, like a password management solution or using passphrases.

Habit 2: On Top of Having Too Few, Too Weak Passwords, Sharing Them

One thing that all of your employees will have in common? Whether you call it “being efficient” or “cutting corners,” they will always be on the lookout for ways to simplify their work processes. One simple way (in their eyes) to do so? Sharing credentials!

Now, for the record, this isn’t in reference to company-owned accounts that are often set up, such as company social media accounts and shared resources. However, since these should be managed by (surprise, surprise) the company, these aren’t really applicable to our considerations.

The main takeaway here is that anyone in your company could create a very bad situation through the wrong actions, and any safeguards you have (such as password protection) are in place to keep the company safe.

Habit 3: Storing Company Files in Personal Storage Solutions

While cloud computing provides a vast amount of value and utility for businesses, there are also a few concerns you need to be aware of. For instance, it isn’t uncommon for employees to utilize their own personal cloud solutions to store company files.

It is important to address the fact that their motives for doing so are oftentimes pure. If an employee wants to commit a little extra time to a project, they very well may simplify things for themselves by sharing a company document with their personal cloud account. However, by doing so, this employee is also taking this document out from behind the protections your company should have in place for its data. This simply should not be done, despite the good intentions that motivate your employees - after all, we all know what they say about good intentions. Fortunately, there are solutions out there to allow your employees to safely access work materials, boosting their productivity without undermining your data security.

Habit 4: Introducing Shadow IT

Shadow IT is software (or hardware) that has been installed (or implemented) on your business’ solutions without the knowledge or approval of IT. This usually happens when your employees are unfamiliar with the solutions you provide to them, so they instead seek out an alternative that they prefer to use. Unfortunately, shadow IT is often the cause of severe issues, so your users need to be compliant to a policy of clearing any technology not provided by IT past IT, helping ensure nothing problematic pops up.

Habit 5: Carelessness While Using Email

Businesses have embraced the advantages of email since it was first introduced, streamlining and accelerating communication. However, these advantages have also come with a few serious risks - and the same goes for file sharing services, too.

Consider what could potentially happen if the wrong information was shared with the wrong person. This means that everyone in a business needs to be aware of the tradeoffs that email and file sharing both present: while collaboration is much easier, it is also easier for data to leak. In order to keep your data where it belongs, your entire team needs to remain aware of this fact.

“Habit” 6: Insufficient Training

This one isn’t so much a habit on the employee’s part as it is on the employer’s. Simply put, your business is going to be vulnerable to security threats if your employees aren’t aware of what threats are out there, and how to spot them.

This is why security training needs to be an integral part of every step in an employee’s career trajectory - starting from the onboarding process and continuing in perpetuity. There are plenty of methods that should be leveraged in order to do so, from phishing tests, team discussions, and other means of evaluating where more training is needed.

Patriot Tech Services Inc. can help you with these evaluations, as well as the training that follows. To learn more, reach out to us at 877-874-4629.

Four Essential Business Software Types to Consider
Tip of the Week: Organization Inside Windows 10


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, August 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Network Security Internet Productivity Hackers Google Cloud Business Computing User Tips Microsoft Innovation Software Computer Efficiency Data Tech Term Mobile Devices Business Management Malware Workplace Tips Hardware Smartphones Data Backup Upgrade Browser Smartphone Hosted Solutions Email Windows 10 Backup Apps Data Recovery Internet of Things Windows 10 Office 365 Small Business Business IT Services communications Communication Gadgets Cybersecurity Mobile Device Management Data Security Miscellaneous Android IT Support Windows VoIP Business Continuity Best Practice Passwords Productivity Outsourced IT Network Artificial Intelligence Disaster Recovery Cybercrime Employer-Employee Relationship Users Spam Holiday Automation Server Information Health Operating System Office Phishing Managed Service Provider Saving Money Blockchain Ransomware Managed Service Virtualization Gmail Two-factor Authentication Social Media Networking OneNote Vulnerability Chrome Remote Computing Managed IT Services Money Applications Microsoft Office Wireless Bandwidth Facebook User Error Update Alert Cost Management Tech Support Government Collaboration Law Enforcement Data Management Bring Your Own Device Google Drive Budget Hacking Word Printing Encryption Mobile Security Wireless Technology Human Resources Hybrid Cloud eWaste BYOD Telephony Access Control Quick Tips Cloud Computing Saving Time Google Assistant Marketing The Internet of Things Social Engineering Fraud Meetings Managed IT Services File Sharing Mobile Device Router Wireless Charging Computers Travel Recovery Conferencing Password Application Apple Save Money Streaming Media Retail Politics Firewall Wi-Fi Cortana Going Green Office Tips Data Breach Telephone Systems VPN Safety Social Windows 7 App Business Technology Information Technology Financial Data Loss iPhone Proactive IT Evernote DDoS Project Management Devices Sports Google Docs Search Personal Information Risk Management Managed IT FAQ Co-Managed Services Development IT budget Running Cable Access Break/Fix Specifications Trending History Camera Server Maintenance Mobile Computing Spyware Teamwork Machine Learning Microsoft Excel Voice over Internet Protocol Shortcut Updates Wireless Internet Bluetooth Windows Ink Proactive Medical IT Commerce Charger Telephone Micrsosoft Instant Messaging Transportation Bloatware Sales Identity Private Cloud Projects Investment Patch Management Biometrics BDR Excel Amazon Files Downtime Television Laptop Vendor Sabotage PowerPoint Microsoft Word Gamification Fax Server Uninterrupted Power Supply Admin Google Maps Websites 5G Customer Relationship Management Value Benefits Hyperlink Digital Signage Audit Identities Software as a Service Robot Lithium-ion battery Data Privacy ROI Vendor Management Edge Virtual Assistant E-Commerce Data Theft Touchpad Employee-Employer Relationship PC Touchscreen Education Maintenance Memory Keyboard Shortcuts Augmented Reality YouTube Mobility Branding Wasting Time Processor Tablets Battery Language PDF Gifts Hard Drive Windows Server 2008 R2 IT solutions Ciminal Alexa for Business Chromecast Payment Cards Remote Monitoring Legislation Computing Operating Sysytem Paperless Office Data Protection Legal Scam Storage Device Security Disaster Payroll Entertainment Data storage Employees Hacker Computer Forensics Internet Exlporer Accessory WannaCry NFL Humor Emergency Credit Cards Chromebook Hosted Solution Display Mobile Office Wearable Technology Administrator Employee Comparison App store Avoiding Downtime Testing Smartwatch IT Management Business Intelligence WiFi Security Cameras Distributed Denial of Service OneDrive SaaS Antivirus Workers Management Peripheral Reputation IT Support Identity Theft Customer Service Virus Unsupported Software Cameras Managing Stress Cleaning Adobe Company Culture Science Compliance IT solutions WIndows Server 2008 Scalability Regulations Music Upgrades Hiring/Firing Nanotechnology Worker Commute User Printer Worker iOS Licensing Regulation Windows 10s How To Settings End of Support Books Consultant Smart Technology Root Cause Analysis Work/Life Balance Printer Server Phone System Computer Accessories USB Advertising Electronic Medical Records Printers Solid State Drive Outlook Near Field Communication Current Events Cache HBO Thank You Presentation Video Games Relocation Best Available Data Storage Save Time Mouse Twitter Computer Fan Hard Drives Hard Disk Drive Sync Samsung intranet Virtual Reality Emails Congratulations CrashOverride Unified Threat Management Automobile Screen Mirroring HaaS Big Data Point of Sale Analytics Tablet Text Messaging WIndows 7 Black Market Training Computer Care Webinar Flexibility Employer Employee Relationship SharePoint Administration IT consulting Experience Cast Keyboard Network Congestion Monitors

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      When you are in the market for some new computers for your business, ensuring that you are targeting the right hardware is important. To educate people on what they should be looking for in a new computer, we have decided to put together a multi-part series detailing the dif...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login