Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

Study Finds an Organization’s Greatest Security Risk isn’t Who You’d Expect

Study Finds an Organization’s Greatest Security Risk isn’t Who You’d Expect

The more users on your network, the more risk that user error could create a costly mistake for your infrastructure. While untrained employees could certainly ignore security policies, the greatest risk to your organization is an unexpected one. Research has proven that your company’s CEO, as well as other C-suite employees, hold one of the greatest risks for your business’ security.

For example, consider just how much sensitive data a CEO has access to. A normal employee may only be able to access information that they directly need for their position, but a CEO’s unique responsibilities require access to just about all data on the infrastructure. In fact, they can access just about anything that they want, which places them at unique risk.

Plus, CEOs usually have a poor work-life balance, putting in far more hours than others within the organization. A CEO who accesses the company network for 60+ hours a week will naturally be a larger risk than one who only accesses it 40 hours a week.

These factors all become magnified when you consider that CEOs use mobile devices to carry out many of their duties. Since they must always be connected to the office, a CEO’s mobile device may unintentionally become cluttered with company records or sensitive information--certainly more so than a normal employee’s personal device.

In the event that an employee has two separate devices for their work and personal life (something that CEOs often can’t accomplish), data leakage can become a problem, resulting in a breach that could expose data to hackers. While CEOs may get to enjoy the flexibility of not being tethered to the office, this risk is considerable, to say the least.

This is even more of a problem while out of the office on public Wi-Fi connections, like those offered at coffee shops, cafes, conference centers, airports, and pretty much everywhere. Hackers tend to exploit public Wi-Fi hotspots because they know they are often unsecured, and the volume of users on them means a surefire target. This is why most technology professionals will suggest avoiding public Wi-Fi whenever possible unless you’re accessing your infrastructure through a secure virtual private network.

A 2017 security report by iPass reinforces these statements with hard proof that public Wi-Fi hot spots are major problems for business owners and other executives. The riskiest connections are as followed:

  • Coffee shops and cafés, 42 percent.
  • Airports, 30 percent.
  • Hotels, 16 percent.
  • Exhibition centers, 7 percent.
  • Airplanes, 4 percent.

Therefore, you need to ask yourself how often your C-suite employees work outside the security and safety of your in-house network. The more time they spend doing business from these risky locations, the more unnecessary risk you’re exposing your business to.

There are even special attacks designed to target CEOs: whaling scams. These scammers take the time to properly research your business and its upper-level executives in an attempt to pull various stunts, including email scams, phone calls, traditional paper mailings, and plenty of other means. Unlike other spam campaigns, these scams are designed to target the deepest, darkest fears of a CEO. On the other hand, there are scams designed to impersonate the CEO in an attempt to convince other employees to wire transfer funds to offshore banking accounts. Either way, CEO fraud is a lucrative endeavor for hackers, and you need to prepare for it.

In order to prevent CEOs and other C-suite employees from becoming large risks to your business, you need to implement additional security measures that specifically take these threats into account. Implementing a solid BYOD policy and enterprise-level security solutions can be a great counter-measure. To learn more, reach out to us at 239-362-9902.

Virtualization Means Accessing Game-Changing Tools...
When Employees Argue, Quality Suffers. Here’s What...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 24 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Malware Best Practices Privacy Network Security Backup Hackers Productivity Software IT Services Managed IT Services Business Ransomware Microsoft Outsourced IT Internet Business Continuity Email Mobile Devices Windows 10 Computer IT Support Google Social Media Productivity User Tips Managed IT Efficiency Hardware Smartphone Recovery Data Recovery Workplace Tips Disaster Recovery Hosted Solutions Unified Threat Management Data Backup Remote Monitoring App Data Android Data Management Training SaaS Managed Service Provider Save Money Cloud Computing Apps Work/Life Balance Innovation IT Support Managed IT Services Office 365 Communication Robot IT Service Hosted Solution Smartphones Facebook How To Risk Management Cybersecurity Content Filtering File Sharing Phishing Word Big Data Password Windows Firewall Internet of Things Mobile Device Collaboration Paperless Office Telephone Systems BDR Botnet Health Samsung Small Business Politics Browser Virtual Reality Computer Care Money Hacker Uninterrupted Power Supply Wireless BYOD Automobile Windows 10 Mobile Device Management VoIP Mobility Files Vendor Management Physical Security Tip of the week Twitter Encryption Data Storage Taxes Virtualization IT Management Going Green VoIP Websites Alert Education Help Desk Holiday Vulnerability Employer-Employee Relationship Server Travel History Emoji Google Drive Bluetooth IBM Tracking Downtime Virus VPN Tablet Motion Sickness Cabling Information Technology Computing Error Electronic Medical Records Avoiding Downtime Antivirus Corporate Profile Document Management Sync Meetings Project Management Sports Virtual Private Network Social Computers How To Unsupported Software Apple Infrastructure Cleaning Private Cloud Time Management Crowdsourcing Hacking WannaCry Mobile Device Managment Wireless Technology Webcam Telephony Mail Merge USB Analytics Customer Service Disaster Public Cloud Network Management Government Trending Monitors Identity Theft Point of Sale Business Technology Address Automation Chrome Google Maps Staffing Cortana Communications Notifications Touchscreen Data loss Web Server Lenovo Redundancy Firefox Mobile Data Legal Search Cameras Superfish Update Personal Information Black Market Customer Relationship Management Solid State Drive Office Tips Microsoft Office YouTube Supercomputer G Suite CCTV Chromebook Assessment Heating/Cooling Hard Disk Drive Network Law Enforcement Outlook IT Solutions Settings IT Budget Licensing Tech Support Wi-Fi Remote Computing Consultation Servers Administrator Gadget Shortcut Upgrades Digital Digital Payment Software Tips IT Consultant Budget Computer Repair Processors Artificial Intelligence Server Management Office WiFi Business Management Patch Management Bandwidth Business Growth Spyware Cybercrime Upgrade Quick Tips Statistics Maintenance GPS CrashOverride Emergency Cost Management Hacks Scam Networking Thank You Congratulations

Newsletter Sign Up