• Jump to contents
  • Jump to main navigation
  • Jump to site map
  • News
  • Insight
  • Careers
  • Support
  • Book a Meeting
  • Contact Us Now
  • Book a Meeting
  • Contact Us Now
  • +44 207 837 2444
  • US and International: +1 323 984 8908
  • Change Region
  • +1 323 984 8908
  • Change Region

Cardonet IT Support for Business

Cardonet are a consultative business partner who will work closely with you to provide a transparent, vendor-neutral approach to your IT Services.

+44 203 034 2244
7 Stean Street, London, E8 4ED

+1 323 984 8908
750 N. San Vicente Blvd, Los Angeles, CA 90069

  • Home
  • IT Solutions
    • Industry Sector IT Solutions
      • Hospitality
        • Hotels
        • Hotel Management
        • Restaurants
        • Pub & Bars
      • Finance Associations
      • Manufacturing
      • Media and Creative
        • Marketing Agencies
        • Public Relations and Communications Agencies
        • Design Agencies
        • Advertising Agencies
        • Market Research Agencies
        • Entertainment
      • Charity
      • Education
    • Business IT Challenges
      • Remote and Hybrid Working
      • IT Outsourcing
      • IT Cost Optimisation
      • Office Move and IT Relocation
      • Global Technology Operations
      • Global IT Helpdesk
      • Cyber Security Journey
      • Technology Compliance
      • Multi-site IT Operations
      • GDPR Compliance
      • PCI DSS Compliance
  • IT Services
    • IT Support
      • 24x7 Service Desk
      • 24x7 Network Monitoring
      • IT Service Delivery
      • Proactive IT Support
      • Remote IT Support
      • Onsite IT Support
      • Out of Hours IT Support
      • Dedicated Service Desk
      • Network Support
      • Microsoft Support
      • Apple Mac Support
      • Business IT Support
    • IT Consultancy
      • IT Strategy
      • IT Projects
      • IT Audits
      • Software Licensing
      • IT Infrastructure
      • IT Procurement
      • IT Supplier Management
      • IT Security
      • IT Networks and Cabling
      • Cloud Readiness
      • Virtualisation
      • Backup and Continuity
    • Managed IT
      • Managed Networks
      • Managed Hosting
      • Managed Backups
      • Business Continuity
    • Managed Cloud
      • Private Cloud
      • Hybrid Cloud
      • Public Cloud
    • Communication
      • Onsite Telephone System
      • Hybrid Telephone System
      • Cloud Telephone System
      • Contact Centre
      • Video Conferencing
      • SIP Trunking
      • Lines and Calls
    • Cyber Security
      • Cyber Security Audit
      • Managed Cyber Security
      • Cyber Compliance
  • About
    • About Cardonet
      • Why Cardonet?
      • News
      • Insight
      • Management Team
      • Case Studies
      • Customers
      • Technology Partners
      • Accreditations & Memberships
      • Approach and Culture
      • History
    • Careers with Cardonet
      • Why Cardonet for your Career?
      • Meet our Team
      • Job Entry Options
      • Current Job Vacancies
  • Contact

News

5 ways your employees can compromise your cyber security in 2022

by Liam Wray / Tuesday, 02 August 2022 / Published in Cyber Security
5 ways employees can compromise cyber security

More than 80% of UK businesses faced a cyberattack over the last year. Many of these attacks were caused by employees.

It’s usually unintentional – the employees might not be well trained in cyber-security protocols, or worse yet, they may not be following that training. 

Here are 5 ways your employees could be a risk to your business’s cybersecurity.

1. They have weak passwords

You have a physical, confidential file. If prying eyes were to find it, it’d spell disaster for your business. What do you do? 

Well, the first step is securing it. For a file of this value, you’d spare no expense in getting a top of the range safe.

The thing is, if you make your birthday the code for the safe, it doesn’t matter how strong its walls are – anyone that is determined to get that file would be able to.

You, and your employees, need to think like this when choosing a password. An easy password, such as a birthday, a relative’s name, or a favourite sports team, is a huge risk to your cyber-security, no matter how sophisticated your software is.

Make sure that your passwords are not easy to guess. This means nothing that a potential hacker could find by peeking at your social media. It also means using long passwords, with a mix of numbers, letters, and symbols. If you want to be extra cautious, your employees should change them regularly.

2. They leave their devices lying around

Hybrid-working is great, but it does bring with it some risks. If your employee is working from a cafe, and they leave their laptop unattended, they’re handing your business’s sensitive data to hackers on a silver platter.

Now, hopefully, your employees use strong passwords, so they wouldn’t be able to access the data immediately. Unfortunately, if a hacker has the device in their possession, even the strongest password might not be good enough.

If they’re able to gain access to it, they could install malware that might infect your entire business’s server and hold your operations hostage. They could also use the employee’s access to poke around sensitive data, stealing and selling whatever they choose.

Your employees should treat their work device as if it’s a physical, confidential file, or the masterkey to all your premises. Leaving a device lying around is actually more dangerous than losing either of these, because a business device, in the wrong hands, could open your entire system.

3. They fall for a phishing attack

Phishing emails are one of the hacker’s most effective tools. The figures speak for themselves: almost half of UK cyberattacks use phishing in some way or another, and worldwide over 3.4 billion of these emails are sent a day.

These emails are so common that they’ve become a bit of a joke – everyone knows the stories about a distant member of royalty asking for a small sum so that they can unlock their fortune and make you rich.

These jokes, however, hide the seriousness of the situation. Phishing scams have become so sophisticated that anyone not practicing strict cyber safety protocols could become a victim. 

If your employees aren’t trained to practice caution when opening emails and the links they contain, it could be disastrous for your business. Hackers can take full control of their devices, and if those devices are on your business’s server, it could become a massive security breach.

Ensure that your employees know what to look for in illegitimate emails and pay extra attention to any links they may click. If there’s anything that makes them doubt the email, they should report it to your IT team immediately. 

4. They want to compromise your cybersecurity

The last three points tackled ways your employees could unintentionally put your business at risk. Unfortunately, it’s not always unintentional. 

A decision may have made them disgruntled, and now they want to inflict harm onto the business. Or it may be greed – they could have been offered a large sum of money for customer data, proprietary information, or insight into your business’s cyber-security infrastructure.

Either way, it’s important to be aware that your employees may purposefully compromise your business’s data and systems.

You should have strict security policies and monitor employee behaviour if they begin to act suspiciously. 

It’s important to remember that your employee is unlikely to make it obvious that they are stealing information – keep an eye out for employees who have just left the company, and ones who are going to be laid off in the coming months.

You should also be clear about what is and isn’t allowed – have strict guidelines that outline what they are and aren’t allowed to access, download, and share, and be sure to enforce these rules.

While you should be aware that this could happen, you shouldn’t treat your employees with constant suspicion. They need trust to do their jobs well – treating them like would-be criminals may only exacerbate the problem.

5. Your business does not have strict access policies

Even if all your employees are completely trustworthy, it makes sense to only give each member of staff access to the data that they need. 

All the risks associated with the above-mentioned ways that your employees might compromise your cyber-security are compounded by weak access policies.

If a hacker managed to gain access to an employee’s business device, and that employee has access to all the customer data and confidential files on your company’s system, that hacker will have free reign.

Restricting access means that the damage they may cause by having a weak password or falling prey to a phishing scam can be limited. What could have been a catastrophic breach may only be a small one.

Employees should only be able to access sensitive information if they need it, and the employees that do need to access it must be trained in the correct cyber security protocols.


If you’re looking for a trusted IT partner to help you and your team build strong defences against cybercriminals, reach out to us today on +44 203 034 2244 or +1 323 984 8908. Alternatively, you can contact us online.

Our friendly team will ensure that you can rest easy knowing that your cyber-security is in safe hands. We have engineering bases in the United Kingdom, Europe and Southern California and our group of highly experienced engineers are available 24/7 to assist you in your move.

Share this on:

  • LinkedIn
  • Twitter
  • Facebook
Tagged under: Cyber Awareness, Cyber Risk, Cyber Security, IT Security

About Liam Wray

Liam is a freelance writer with an interest in technology.

What you can read next

10 ways to secure your network
10 Ways to Secure Your Network
Discussing how to strengthen your passwords against cybercriminals.
Password Security: Could you be your business’ weakest link?
Cybersecurity Mistakes
10 Most Common Cybersecurity Mistakes Businesses Make

You must be logged in to post a comment.

Featured Posts

  • Microsoft Teams vs Slack

    Teams or Slack: Making the Right Collaboration Platform Choice for Your Business

  • Secure Network Architecture for Restaurants

    Zero Trust in the Kitchen: Why Your Fryer Needs a Different Network Than Your Guests

  • Protecting your IP for your Creative Agency

    When Client Campaigns Leak: Protecting Creative IP in the Digital Age

  • Restaurant POS Security-breach PCI compliance guide

    The POS Cyber Security Breach That Closed 300 Restaurants: Lessons for Hospitality 

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • April 2025
  • June 2024
  • April 2024
  • February 2024
  • January 2024
  • October 2023
  • September 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017

Categories

  • Bam's Blog
  • Customers
  • Cyber Security
  • Events
  • GDPR
  • Guidance
  • IT Consultancy
  • IT Support
  • Managed IT
  • Press Release
  • Recruitment
  • Team
  • Uncategorised
  • USA
  • What is

Tags

Business Business Continuity Christmas Party Cloud Computing Compliance coronavirus Covid 19 Cyber Awareness cyber crime Cyber Risk Cyber Security Cyber Threat Data Backups Disaster Recovery GDPR Halloween HOSPACE Hospitality Hotel Hotel IT Services Hotel IT Solutions Hotel IT Support Hotels Hotel Technology IT infrastructure IT Services IT Support Microsoft Microsoft365 Migration Office365 Outsourced IT Support Outsourcing IT Pancake Pancake Day Remote Working Security Software Team Team Event Windows 10 Windows 10 End of Life Windows 10 Upgrade Windows 11 Windows 11 Upgrade

Cardonet Twitter

Could not authenticate you.
TOP

We will help you overcome your technology challenges

Call us on +1 323 984 8908, email us at or fill out the following form to start the conversation.

",

For further information on how we process your data, please refer to our Privacy Policy.

IT Solutions

  • IT Solutions by Industry
  • Business IT Challenges

IT Services

  • IT Support
  • IT Consultancy
  • Managed IT
  • Managed Cloud
  • Communication
  • Cyber Security

About

  • Why Cardonet
  • Meet our Team
  • News
  • Insight
  • Case Studies
  • Careers

Contact

  • +44 207 837 2444
  • +1 323 984 8908
  • Change Region
Cardonet 26 years proudly supporting our customer
  •  
  •  
  • 750 N. San Vicente Blvd, Los Angeles, CA 90069
Cardonet IT Support and IT Services
Change Region
  • United Kingdom and Europe
  • United States and International

© 1999 - 2023 All rights reserved.

  • Sitemap
  • Terms and Conditions
  • Privacy Policy
  • GDPR
  • Accessibility Statement
  • Corporate Social Responsibility
  • Environmental Policy
Contact TOP
Cardonet
Cardonet Consultancy Limited 7 Stean Street London, Greater London E8 4ED
London Map +442030342244
Cardonet US Inc 750 N. San Vicente Blvd, West Hollywood Los Angeles, California 90069
Los Angeles Map +13239848908
Home Cardonet IT Support Logo