312-253-4321    Get SUPPORT

Alchetec Blog

By accepting you will be accessing a service provided by a third-party external to https://www.alchetec.com/

Is Your Staff Holding Up Their End on Security?

Is Your Staff Holding Up Their End on Security?

It seems as though every business is depending more and more on their IT. This means that their employees have more exposure to their IT systems. Unfortunately, that relationship is where the majority of the problems you will have are. The facts are that any business that has built a strong security policy has the solutions in place to keep direct infiltration from happening. Hackers have to find another way.

To make this happen, scammers create and send billions of phishing emails (and other messages) each day. Some of them will inevitably hit your company’s email. Even if you use the built-in firewall, the vast majority of them will be sent to spam. If you’ve outfitted your system with an enterprise spam blocker, your staff will see even less yet. Unfortunately, however, eventually one will make its way into an inbox. Sometimes the person is targeted directly and sometimes it’s just misfortune, but regardless of the variables surrounding these messages, interacting with one will very likely be problematic for your business.

This is why you spend so much time and money developing procedures, training your staff, and testing their aptitude: to be confident that they know what to do if they encounter problematic situations. Sometimes the attacks are very complex, but more often than not, all it takes is decoding, discarding, and reporting a hazardous message for them to be an actual hero. If your staff is highly trained, it will become just another part of their job. That’s the goal.

Of course, that’s not always the case. In fact, in one study, 77 percent of IT professionals feel as though their companies are unprepared to confront today’s most prevalent security challenges. That number has to scare you a little bit. Fortunately for business owners, IT professionals are notoriously pessimistic about the ability of people to make the right choices. The truth is that breaches do happen and they can be separated into three categories: mistakes, negligence, and sabotage. 

If you are going to be a company that is prepared for the threats that are going to come your way, you need to understand the difference. 


Mistakes happen. They always have and they always will. People who are normally diligent, hardworking, and good at their jobs can make a decision that is simply wrong. As we mentioned earlier, there are literally billions of phishing emails sent per day, and it’s not out of the realm of possibility that you, your best employees, even your IT provider can mistakenly click on a link that opens up Pandora's box. If someone makes a mistake, immediately reports it, and it’s obvious there was no malice behind it, it’s really hard to come down on that individual too harshly. A mistake is a mistake, after all. You will want to retrain that person and test them to ensure that they understand what their responsibilities are, but ultimately isolated incidents should be met with understanding.


On the other hand, if an employee continues to make mistakes regularly, it’s probably a matter of negligence. Obviously, negligent behavior shows that the employee is ambivalent to the rules set forth by the decision makers and is a problem when it comes to organizational network security. An employee that doesn’t take his/her training seriously probably isn’t taking many other aspects of his/her job seriously, either. Negligence is the cause of a majority of the cybersecurity problems that businesses are forced to confront, and cannot be allowed to undermine the organization.


Sometimes work relationships fail. There are a plethora of reasons why this happens, but most people have run into problems with a coworker, direct supervisor, or employer at some point in their work history. Sometimes the relationship gets so tainted that one party will look to undermine the other. Sabotage is when a current or former employee deliberately undermines the continuity of a business. Sabotage is criminal and purposeful. It can be something as simple as deleting files from a project or smashing company property, and it can be as complex as embezzlement and selling trade secrets to the competition. Most sabotage happens as a result of a work relationship that has turned sour. Unfortunately, if the saboteur still works for your company, you may not be able to catch him/her before it’s too late, but many of them are disgruntled ex-employees who for whatever reason still have access to company systems. For this reason, it is important that as soon as someone is let go or leaves the company, that their access to company resources is eliminated. Someone who knows where things are on your business’ network can really do a number. Avoid that fate by closing that door.

Cybersecurity is a complex issue with many facets. Make sure your business has all the resources it needs to protect your digital assets. Call the IT experts at Alchetec today at 312-253-4321 to learn more.

Tip of the Week: Some Keyboard Shortcuts You May N...
Avoid Burning Out While Working From Home


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 04 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Cloud Network Security Data Data Backup IT Services Privacy Hosted Solutions IT Support Software Malware Hackers Internet Email Efficiency Outsourced IT Business Microsoft Data Recovery Innovation Computer Hardware Business Continuity Small Business Cloud Computing Productivity Cybersecurity Managed IT Services Managed IT Services Mobile Devices Ransomware Backup User Tips Upgrade Collaboration Tech Term Google Phishing Communication Windows 10 Business Management Workplace Tips VoIP Mobile Device IT Support Smartphone Android Paperless Office Disaster Recovery Managed Service Provider Smartphones Managed Service Office 365 Data Management Remote Monitoring Quick Tips Server Browser Communications Internet of Things Managed IT Network Save Money Encryption Social Media Facebook Passwords Virtualization Compliance Help Desk Holiday Business Technology Artificial Intelligence Miscellaneous Saving Money BDR Wi-Fi Document Management Microsoft Office Health Government Remote Work Healthcare Training Windows 10 BYOD Windows 7 Windows Applications Vendor Management Data Security Risk Management Users Office Employer-Employee Relationship Laptops Automation Password Recovery Chrome Blockchain Going Green Apps Information Regulations Infrastructure Data loss Tip of the week Avoiding Downtime Unified Threat Management Antivirus Mobility SaaS Redundancy Processor Vulnerability Storage Maintenance Telephone Systems IT Management Scam Two-factor Authentication File Sharing Analytics Project Management Bandwidth Files IoT Access Control Virtual Private Network Money Covid-19 Gadgets Data Storage Firewall Company Culture Customer Relationship Management Politics Software as a Service Flexibility Tablet Big Data Machine Learning Website Virtual Reality Work/Life Balance Bring Your Own Device IT Service Hosted Solution Proactive Computers Robot Wireless Meetings OneDrive Router Mobile Device Management Employee-Employer Relationship Gmail RMM Computing Word App VPN Hard Drive Monitors Samsung Downtime Remote Worker Data Breach Managed Services Cooperation Digital Payment Mobile Security Search The Internet of Things Identity Theft Chromebook Licensing Monitoring Twitter Recycling Assessment Utility Computing Electronic Health Records Social Printing Customer Service Dark Web Consulting Remote Computing Electronic Medical Records Patch Management Apple Mobile Office Time Management Social Network Outlook How To Consultation Unified Communications Uninterrupted Power Supply Upgrades Employees Managed Services Provider Smart Technology Network Management File Management Data Storage Management Information Technology Remote Monitoring and Management Net Neutrality Payment Cards HIPAA Settings Display Professional Services Alert Server Management Remote Workers How To Co-Managed IT Operating System Networking Internet Exlporer Solid State Drive Augmented Reality Telephone IT Technicians Geography Digital Tech Support Backup and Disaster Recovery Bitcoin Video Conferencing G Suite Cabling Wireless Technology 5G E-Commerce Virtual Assistant Websites Computer Care WannaCry IBM Finance Hard Disk Drives Specifications Proactive Maintenance Business Telephone Managed IT Service Cookies Safety Black Market Mobile Bookmarks Computer Repair Crowdsourcing Optimization Social Networking Hacker Fleet Tracking Tech Terms Google Drive User Management Cache Taxes Hard Disk Drive Mobile VoIP Mirgation High-Speed Internet Spyware Budget Human Error Botnet Firefox Current Events Biometric Permissions Star Wars Features Wasting Time Notifications Statistics SharePoint Staff Authentication Sports Mail Merge Database Management IT Assessment Break Fix Nanotechnology Network Congestion Physical Security ROI Technology Laws Vendor Favorites Teamwork Shortcut Solid State Drives Virtual Machines Black Friday Motherboard Humor Asset Tracking Theft Business Growth Techology Batteries Peripheral Hotspot Cyber security Migration Development Cortana MSP Permission Lenovo Projects Gamification Fraud End of Support Disaster Database Bluetooth Downloads Operations Managing Stress WiFi VoIP Authorization Telephony Address GDPR Digitize Screen Reader Education Software Tips Notes Heating/Cooling Unified Threat Management Smart Devices Conferencing Shared resources Technology Tips Options Credit Cards Cyber Monday Mobile Computing Office Tips OneNote Financial Automobile Disaster Resistance PCI DSS Language eWaste Multi-Factor Security Chatbots Cables Test Emoji Superfish Return on Investment Outsource IT Cybercrime Cyberattacks Voice over Internet Protocol Sensors Wearable Technology Enterprise Content Management GPS YouTube Spam Shadow IT Data Warehousing Smart Tech IT Solutions PowerPoint Processors Servers User Error Legal Law Enforcement Mouse Wireless Internet Holidays Google Maps Procurement USB Proactive IT Computing Infrastructure Hacking Google Calendar Windows Server 2008 Identity Unsupported Software Supercomputer Private Cloud Active Directory Laptop Cost Management Travel Read Only Personal Information Vulnerabilities 3D Printing Tracking Wires Zero-Day Threat Update Outsourcing Microsoft Excel Connectivity Content Filtering History Point of Sale Printer Corporate Profile Instant Messaging Manufacturing Gadget Comparison Employer/Employee Relationships IT Distributed Denial of Service Modem Dark Data Security Cameras Touchscreen IT Consulting Value of Managed Services Alerts Enterprise Resource Planning Transportation Virus Trending Legislation Mobile Data IT Budget WPA3 Windows Server Remote Working Social Engineering Emergency Hard Drives Students Marketing Public Cloud Regulation Staffing Sync Competition IP Address IT Consultant CrashOverride Hacks Mobile Device Managment Administrator Relocation Domains Hiring/Firing Fun Public Speaking Presentation Cleaning Lithium-ion battery CRM Printers Error Motion Sickness