{"id":4487,"date":"2022-08-02T00:42:00","date_gmt":"2022-08-02T07:42:00","guid":{"rendered":"https:\/\/cardonet.com\/news\/?p=4487"},"modified":"2022-07-27T00:50:24","modified_gmt":"2022-07-27T07:50:24","slug":"5-ways-your-employees-can-compromise-your-cyber-security-in-2022","status":"publish","type":"post","link":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/","title":{"rendered":"5 ways your employees can compromise your cyber security in 2022"},"content":{"rendered":"\n<p>More than 80% of UK businesses faced a cyberattack over the last year. Many of these attacks were caused by employees.<\/p>\n\n\n\n<p>It\u2019s usually unintentional &#8211; the employees\u00a0<a href=\"https:\/\/cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>might not be well trained<\/strong><\/a>\u00a0in cyber-security protocols, or worse yet, they may not be following that training.\u00a0<\/p>\n\n\n\n<p>Here are&nbsp;<strong>5 ways your employees could be<\/strong>&nbsp;<strong>a risk to your business\u2019s cybersecurity<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. They have weak passwords<\/strong><\/h3>\n\n\n\n<p>You have a physical, confidential file. If prying eyes were to find it, it\u2019d spell disaster for your business. What do you do?&nbsp;<\/p>\n\n\n\n<p>Well, the first step is securing it. For a file of this value, you\u2019d spare no expense in getting a top of the range safe.<\/p>\n\n\n\n<p>The thing is,&nbsp;<strong>if you make your birthday the code for the safe, it doesn\u2019t matter how strong its walls are<\/strong>&nbsp;&#8211; anyone that is determined to get that file would be able to.<\/p>\n\n\n\n<p>You, and your employees, need to think like this when choosing a password. An easy password, such as a birthday, a relative\u2019s name, or a favourite sports team, is a huge risk to your cyber-security,&nbsp;<strong>no matter how sophisticated your software is<\/strong>.<\/p>\n\n\n\n<p>Make sure that your passwords are not easy to guess. This means nothing that a potential hacker could find by peeking at your social media. It also means using&nbsp;<strong>long passwords, with a mix of numbers, letters, and symbols<\/strong>. If you want to be extra cautious, your employees should change them regularly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. They leave their devices lying around<\/strong><\/h3>\n\n\n\n<p>Hybrid-working is great, but it does bring with it some risks. If your employee is working from a cafe, and they leave their laptop unattended,&nbsp;<strong>they\u2019re handing your business\u2019s sensitive data to hackers on a silver platter.<\/strong><\/p>\n\n\n\n<p>Now, hopefully, your employees use strong passwords, so they wouldn\u2019t be able to access the data immediately. Unfortunately, if a hacker has the device in their possession, even the strongest password might not be good enough.<\/p>\n\n\n\n<p>If they&#8217;re able to gain access to it, they could install malware that might infect your entire business\u2019s server&nbsp;<strong>and<\/strong>&nbsp;<strong>hold your operations hostage<\/strong>. They could also use the employee\u2019s access to poke around sensitive data,&nbsp;<strong>stealing and selling whatever they choose<\/strong>.<\/p>\n\n\n\n<p>Your employees should treat their work device as if it\u2019s a physical, confidential file, or the masterkey to all your premises. Leaving a device lying around is actually more dangerous than losing either of these, because&nbsp;<strong>a business device, in the wrong hands, could open your entire system.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. They fall for a phishing<\/strong> attack<\/h3>\n\n\n\n<p>Phishing emails are one of the hacker\u2019s&nbsp;<strong>most effective tools<\/strong>. The figures speak for themselves: almost half of UK cyberattacks use phishing in some way or another, and worldwide over 3.4 billion of these emails are sent a day.<\/p>\n\n\n\n<p>These emails are so common that they\u2019ve become a bit of a joke &#8211; everyone knows the stories about a distant member of royalty asking for a small sum so that they can unlock their fortune and make you rich.<\/p>\n\n\n\n<p><strong>These jokes, however, hide the seriousness of the situation.<\/strong>&nbsp;Phishing scams have become so sophisticated that anyone not practicing strict cyber safety protocols could become a victim.&nbsp;<\/p>\n\n\n\n<p>If your employees aren\u2019t trained to practice caution when opening emails and the links they contain, it could be disastrous for your business. Hackers can take full control of their devices, and if those devices are on your business\u2019s server,&nbsp;<strong>it could become a massive security breach<\/strong>.<\/p>\n\n\n\n<p>Ensure that your employees know what to look for in illegitimate emails and pay extra attention to any links they may click. If there\u2019s anything that makes them doubt the email,&nbsp;<strong>they should report it<\/strong>&nbsp;to your IT team immediately.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. They&nbsp;<u>want<\/u>&nbsp;to compromise your cybersecurity<\/strong><\/h3>\n\n\n\n<p>The last three points tackled ways your employees could unintentionally put your business at risk.\u00a0<a href=\"https:\/\/cardonet.com\/news\/insider-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Unfortunately, it\u2019s not always unintentional<\/strong><\/a>.\u00a0<\/p>\n\n\n\n<p>A decision may have made them disgruntled, and now they want to inflict harm onto the business. Or it may be greed &#8211; they could have been offered a large sum of money for customer data, proprietary information, or insight into your business\u2019s cyber-security infrastructure.<\/p>\n\n\n\n<p><strong>Either way, it\u2019s important to be aware that your employees may purposefully compromise your business\u2019s data and systems.<\/strong><\/p>\n\n\n\n<p>You should have strict security policies and monitor employee behaviour if they begin to act suspiciously.&nbsp;<\/p>\n\n\n\n<p>It\u2019s important to remember that your employee is unlikely to make it obvious that they are stealing information &#8211; keep an eye out for employees who have just left the company, and ones who are going to be laid off in the coming months.<\/p>\n\n\n\n<p><strong>You should also be clear about what is and isn\u2019t allowed<\/strong>&nbsp;&#8211; have strict guidelines that outline what they are and aren\u2019t allowed to access, download, and share, and be sure to enforce these rules.<\/p>\n\n\n\n<p>While you should be aware that this could happen, you shouldn&#8217;t treat your employees with constant suspicion.&nbsp;<strong>They need trust to do their jobs well &#8211; treating them like would-be criminals may only exacerbate the problem.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Your business does not have strict access policies<\/strong><\/h3>\n\n\n\n<p>Even if all your employees are completely trustworthy, it makes sense to only give each member of staff access to the data that they need.&nbsp;<\/p>\n\n\n\n<p>All the risks associated with the above-mentioned ways that your employees might compromise your cyber-security are&nbsp;<strong>compounded by weak access policies<\/strong>.<\/p>\n\n\n\n<p>If a hacker managed to gain access to an employee\u2019s business device, and that employee has access to all the customer data and confidential files on your company\u2019s system, that hacker will have free reign.<\/p>\n\n\n\n<p>Restricting access means that the damage they may cause by having a weak password or falling prey to a phishing scam can be limited.&nbsp;<strong>What could have been a catastrophic breach may only be a small one.<\/strong><\/p>\n\n\n\n<p>Employees should only be able to access sensitive information if they need it, and the employees that do need to access it must be trained in the correct cyber security protocols.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>If you\u2019re looking for a trusted IT partner to help you and your team build strong defences against cybercriminals, reach out to us today on +44 203 034 2244 or +1 323 984 8908. Alternatively, you can&nbsp;<\/strong><a href=\"https:\/\/www.cardonet.co.uk\/contact-it-services.php\"><strong>contact us online<\/strong><\/a><strong>.<\/strong><\/p>\n\n\n\n<p><strong>Our friendly team will ensure that you can rest easy knowing that your cyber-security is in safe hands. We have engineering bases in the United Kingdom, Europe and Southern California and our group of highly experienced engineers are available 24\/7 to assist you in your move.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than 80% of UK businesses faced a cyberattack over the last year. Many of these attacks were caused by employees. It\u2019s usually unintentional &#8211; the employees\u00a0might not be well trained\u00a0in cyber-security protocols, or worse yet, they may not be following that training.\u00a0 Here are&nbsp;5 ways your employees could be&nbsp;a risk to your business\u2019s cybersecurity.<\/p>\n","protected":false},"author":8,"featured_media":4488,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[520],"tags":[720,719,682,807],"class_list":["post-4487","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-awareness","tag-cyber-risk","tag-cyber-security","tag-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 ways your employees can compromise your cyber security<\/title>\n<meta name=\"description\" content=\"Here are 5 common ways that your employees could be a risk to your business\u2019s cybersecurity in 2022.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 ways your employees can compromise your cyber security\" \/>\n<meta property=\"og:description\" content=\"Here are 5 common ways that your employees could be a risk to your business\u2019s cybersecurity in 2022.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-02T07:42:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/07\/5-ways-employees-can-compromise-cyber-security-cardonet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Liam Wray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Wray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 ways your employees can compromise your cyber security","description":"Here are 5 common ways that your employees could be a risk to your business\u2019s cybersecurity in 2022.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/","og_locale":"en_US","og_type":"article","og_title":"5 ways your employees can compromise your cyber security","og_description":"Here are 5 common ways that your employees could be a risk to your business\u2019s cybersecurity in 2022.","og_url":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/","og_site_name":"News","article_published_time":"2022-08-02T07:42:00+00:00","og_image":[{"width":600,"height":334,"url":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/07\/5-ways-employees-can-compromise-cyber-security-cardonet.png","type":"image\/png"}],"author":"Liam Wray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Liam Wray","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/#article","isPartOf":{"@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/"},"author":{"name":"Liam Wray","@id":"https:\/\/cardonet.com\/news\/#\/schema\/person\/4793159d5cd8ce4688ade48ba77da149"},"headline":"5 ways your employees can compromise your cyber security in 2022","datePublished":"2022-08-02T07:42:00+00:00","mainEntityOfPage":{"@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/"},"wordCount":1124,"commentCount":0,"publisher":{"@id":"https:\/\/cardonet.com\/news\/#organization"},"image":{"@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/07\/5-ways-employees-can-compromise-cyber-security-cardonet.png","keywords":["Cyber Awareness","Cyber Risk","Cyber Security","IT Security"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/","url":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/","name":"5 ways your employees can compromise your cyber security","isPartOf":{"@id":"https:\/\/cardonet.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/#primaryimage"},"image":{"@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/07\/5-ways-employees-can-compromise-cyber-security-cardonet.png","datePublished":"2022-08-02T07:42:00+00:00","description":"Here are 5 common ways that your employees could be a risk to your business\u2019s cybersecurity in 2022.","breadcrumb":{"@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/#primaryimage","url":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/07\/5-ways-employees-can-compromise-cyber-security-cardonet.png","contentUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/07\/5-ways-employees-can-compromise-cyber-security-cardonet.png","width":600,"height":334,"caption":"5 ways employees can compromise cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/cardonet.com\/news\/5-ways-your-employees-can-compromise-your-cyber-security-in-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News Home","item":"https:\/\/cardonet.com\/news\/"},{"@type":"ListItem","position":2,"name":"5 ways your employees can compromise your cyber security in 2022"}]},{"@type":"WebSite","@id":"https:\/\/cardonet.com\/news\/#website","url":"https:\/\/cardonet.com\/news\/","name":"News","description":"IT Services from Cardonet","publisher":{"@id":"https:\/\/cardonet.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cardonet.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cardonet.com\/news\/#organization","name":"Cardonet","url":"https:\/\/cardonet.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cardonet.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","contentUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","width":1920,"height":1080,"caption":"Cardonet"},"image":{"@id":"https:\/\/cardonet.com\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cardonet.com\/news\/#\/schema\/person\/4793159d5cd8ce4688ade48ba77da149","name":"Liam Wray","description":"Liam is a freelance writer with an interest in technology.","sameAs":["http:\/\/www.cardonet.com"]}]}},"_links":{"self":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/comments?post=4487"}],"version-history":[{"count":0,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4487\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/media\/4488"}],"wp:attachment":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/media?parent=4487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/categories?post=4487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/tags?post=4487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}