Do you know where the gaps in digital security are in your company?
Gaps in digital security around the office are an information security risk, which can lead to data loss, breaches, unintended violations of privacy laws and more.
Here are a few of the more frequent information security gaps in the workplace today, and tips for managing those risks.
- Cell Phones, Tablets and other Mobile Devices: The ever-increasing mobile workforce is an easy target for cyber criminals. With the right equipment, nearby mobile devices can be accessed easily. Small, compact mobile devices are also very easy to steal. Additionally, apps are huge IT security risks. According to a recent report, hundreds of apps were found to have security issues in 2016. Manage the Risks: Implement a well-supported mobility and security awareness program. Teach best practices like how to recognize and respond to suspicious text messages and don’t click on links! Control devices, and limit apps to an approved list. Additionally, put a password on any wireless network.
- Employees who just don’t Care: Studies suggest that up to 95% of information security breaches involve human error. Common errors include system misconfiguration, poor patch management, easy-to-guess passwords, lost devices, accidental disclosure of information by email, phishing links, and leaving computers unattended. Manage the Risks: Use automated safeguards such as password management, identity and access management, and network access rules. Support secure work habits with awareness campaigns. Embed policies like a Shred Everything Policy, which requires employees to securely destroy all documents when they are no longer needed.
- Insider Fraudsters: Within the past year, 3/4 of companies have had an incident of fraud. Where fraud occurred and the perpetrator was identified, 81% were insiders. The 2016 Global Fraud Study reported that the most glaring organizational weakness was lack of internal controls. It was cited in almost a third of cases. Manage the Risks: Managing security risks also means putting policies in place to reduce sensitive information being left out in the open. Partner with a document destruction company that has a secure chain of custody. Implement a Clean Desk Policy, which helps protect confidential information in digital and paper formats.
A reliable paper shredding company will recycle paper documents after secure shredding – so there’s no security gap there.