Educating Employees Help Keep Data Secure

With the growing world of technology, the IT manager is plagued with the grueling task of technology audits. Audit checks are carefully planned, controls are tested and evaluated, and then reports help identify problem areas to work on. The method in which you choose to audit an organization depends greatly on the organization; nonetheless, one factor of auditing should not be overlooked—the follow-up.

At a high level, follow-ups can be divided in two subsets: i) Education, and ii) the technological eco-system. However, in this blog we focus on the education aspect of one unpredictable (and sometimes expensive) risk to the enterprise’s security when left unattended—the Employee.

Continuous and periodic training of employees to remind them of general security practices is imperative for a healthy and secure organization.  Here are some follow-up topics that employees can be trained in:

  1. Passwords: Reviewing proper storage of passwords and continually prompting password changes are important. How often are employees writing their passwords down in a notebook somewhere, free for any person to access? Are the employees using hexadecimal variations of their passwords?
  2. Multiple Device Management (MDM): Review the proper procedures for using devices within the network (for both enterprise and personal devices). SecureDoc enables user devices to communicate back to a centralized console which is ideal for a multiple device ecosystem; thus, providing oversight and much more ease as the console is available online.
  3. Proper Internet Usage: With the advent of BYOD, it is difficult to just simply block websites for every device, so ensure that employees are aware of how to evaluate root certificates and application downloads.
  4. Troubleshooting: When employees are educated in the proper use of a device, they will often troubleshoot themselves, rather than flood the IT manager’s inbox with menial problems. This can include simple operational methods such as the infamous, “Turn off, unplug, plug back in, Turn on.”

A strong network requires an integrative approach to security, so don’t forget about integrating the employees in your follow-up strategies. Put reminders in their calendars, send them memos, and hold semi-annual Security Sweep days; regardless, of how you do it, just educate them!

Previous Post
Data Security and Compliance in the Healthcare Industry
Next Post
Have a good rest on Civic Day, Canada!

Related Posts

Weak Passwords

We have been using passwords since the 1960’s, where the origins of the internet date back to. Yet with the passing years our passwords have become weaker, and easier for cyber criminals to hack. Don’t think so? Does your password…
Read more

A more BYOD friendly MDM

If Cisco’s forecasts are accurate, in a couple of months the number of mobile-connected devices will exceed the number of people on the planet, and by 2017 there will be nearly 1.4 mobile devices per each person. (more…)

Email Security Tips

It’s been a crazy year for data breaches, with so many high profile hacks, employees should take extra precautions to not become a victim. (more…)

It’s a BYOD World Embrace It or Expire.

There is a great debate raging in the security industry today on how to best provide secure corporate data in a BYOD world. The consumerization of IT and bring-your-own-device (BYOD) are becoming prevalent in organizations at lightning speed, both with…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu