Getting Your Staff to Understand How Important Security Is

Getting Your Staff to Understand How Important Security Is

Being a business owner in charge of new IT procedures can be a major pain, especially when it comes to your employees. How often do you experience pushback on any significant change to your IT infrastructure or policies? You’re not the only one--many organizations are in the same boat as you, and it can be a difficult situation to be in.

The average employee is either unaware of the everyday IT security threats or what could happen as a result of poor data sharing habits. They probably know a passable amount of password security best practices at the most, and even getting to this point can be difficult. We aren’t trying to sound negative--it just comes with the territory. You don’t hire your organization’s employees because they are tech-savvy (unless they are your IT department), but it’s still your responsibility to make sure they understand any new security initiative, as well as respond to any initial pushback.

To best illustrate this point, let’s take a look at password security:

An Examination of Employees Rejecting IT Security
Imagine this scenario; your IT provider creates a group policy that forces users to change their passwords every 30 days. Repeating the same password is out of the question, and it has to meet a certain complexity threshold in order to be accepted. You might think this is a great idea, but your employees are going to spit fire at you the second they find out what’s happened. If they don’t, they will let it simmer on the back-burner, complaining about the new policy to anyone who will listen. Eventually, you’ll find out about it, but this kind of scenario can quickly become a toxic work environment. You might have your organization’s best interests in mind, but your employees will only see it as an inconvenience.

This might seem on the extreme side, but you’d be surprised by how often this happens. Here are some other topics that might stoke the fire under your employees:

  • Bring Your Own Device Policies: If your employees use their personal devices for work purposes, it’s a best practice to have a BYOD policy in place. Your employees likely will push back against this, but in reality, it’s in the best interest of your network security to have it.
  • Firewalls and Content Filters: The Internet is a major time-waster, and you might be surprised to see how much time is wasted away by employees streaming video or lurking on message boards. The solution is to block these sites, even if it seems a bit extreme.
  • Implementing New Technologies: Any time you implement a new solution, you’ll experience pushback, even if it’s something like adding an application or moving data to the cloud. Some might adopt the the solution no problem, but others will fight to the bitter end just to keep to their old solutions.

Ultimately, just about anything new is enough to ruffle your employees’ feathers and create some difficult situations. They don’t care that you’re trying to protect your business--even if it’s in their best interest.

What Can You Do?
The biggest reason why your employees might push back against any change to your IT policies is simple; they want to get their job done as quickly and efficiently as possible, and they see change, whether it’s in the form of a new application or a password reset, as an inconvenience. Something meant to secure your network will look like a roadblock to your employees, and when it gets in the way of them doing their job, of course they will fight back.

It doesn't matter if you’re trying to improve the company as a whole. Someone on your staff is going to look at the new solution as a disruption of everything they know. Some might even see a BYOD policy or content filter as a sign that they aren’t to be trusted, when in reality it’s just to protect your organization from the possibility of a data breach. There’s only one solution to this goal, and it starts with you, the business owner.

Leadership is Key
If you want your employees to embrace change, it all starts at the top. Your C-level administrators and managers should also be on-board with any change going on in your workplace. It helps to show employees that they aren’t the only ones who have to abide by the rules--even their boss does. Remember, your job is to make sure your employees know why these solutions have to exist, and you have to remember that you don’t need their permission to do what’s best for your business.

If your business wants to improve network security, BNMC can help. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 23 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Microsoft Software Network Security Internet Google Tech Term Computer Hosted Solutions Ransomware Business Mobile Devices IT Services Backup Smartphone Small Business Managed IT Services Android User Tips Efficiency Saving Money Business Continuity Cloud Computing Data Recovery Hardware Data Management Windows IT Support Internet of Things Innovation App Productivity Windows 10 Cybersecurity Communication Data Browser Data Backup Remote Monitoring Encryption Passwords Artificial Intelligence Gmail Facebook Server Business Management Managed IT Services Vulnerability Outsourced IT Word Employer-Employee Relationship Disaster Recovery Analytics Smartphones communications Windows 10 Productivity Office 365 Chrome Managed Service Provider Infrastructure Tip of the week Network Applications Microsoft Office Phishing Money IT Support YouTube Maintenance Risk Management Social Media Website Robot Save Money IT Management Office Tips Google Drive Content Filtering Bandwidth Upgrade Big Data Government Settings Data storage BYOD Antivirus Spam Computing Firewall Outlook WiFi LiFi Company Culture Monitors Vendor Management Hosted Solution VPN Wireless Data Security Administration Business Technology Mouse Managing Stress Automation Server Management End of Support Touchscreen Laptop Miscellaneous Virtual Private Network Virtual Reality Mobile Device The Internet of Things Apple Paperless Office VoIP Storage HIPAA SaaS Information Unified Threat Management Two-factor Authentication Mobile Security Holiday Data loss Telephone Systems Avoiding Downtime Scam Workplace Tips Alert desktop Business Intelligence IT Technicians Optimization Customer Service Collaboration Time Management Printer Alt Codes Connectivity Digital Signage Break Fix Networking Bring Your Own Device Modem Operating System FinTech Office Samsung Monitoring Search Black Friday Staff Leominster Emergency Regulations Budget Uninterrupted Power Supply Servers Google Calendar Scary Stories Language Social Value Document Management Tech Support Spyware Mirgation Information Technology Recycling File Sharing Chromebook Network Management Access Control Running Cable Typing IoT Humor Computer Care IBM Troubleshooting Dark Web Best Practice Cookies MSP Social Engineering Solid State Drive Spying Cyber Monday Buisness Augmented Reality Current Events K-12 Schools Virtual Desktop Social Networking Analysis Legislation Sports Computing Infrastructure Professional Services Identity Theft Websites Apps Chatbots eWaste SharePoint Cryptocurrency Star Wars Training Corporate Profile Microsoft Excel Wearable Technology Going Green Network upgrade Automobile Quick Tips Techology Nanotechnology Google Docs Development Safety Hard Disk Drive Employee-Employer Relationship Managed IT Smart Technology IT solutions How To Lenovo Motherboard Cables Remote Computing Dell Managed Service Statistics Tablet Education Alerts Hacks USB Identity Google Wallet Continuity Network Congestion Cabling Downloads Fraud Bitcoin Cost Management WannaCry Mail Merge Blockchain Printing Smart Office Google Maps VoIP Unified Threat Management Cybercrime Business Growth Screen Reader Charging PowerPoint Shortcut Distributed Denial of Service Downtime Firefox Superfish Legal Wires Writing Bluetooth Comparison Marketing Licensing Password Dongle Wi-Fi Permissions Unified Communications Drones Solar Computers Gadgets Windows 8 Assessment Address Work Dark Data User Error Hacker Smart Tech Onboarding Patch Management Managed IT Service Digital Payment Customer Relationship Management Deep Learning Router Voice over Internet Protocol Retail Slack Specifications Cooperation Service Level Agreement Compliance Display Disaster Heating/Cooling Multi-Factor Security Users Halloween Hotspot Internet Exlporer Politics Digital Recovery How To Cleaning Work/Life Balance Health Private Cloud CCTV Mobile Computing Webcam Black Market Law Enforcement Error Electronic Medical Records Notifications Point of Sale Twitter Ben McDonald shares Physical Security Travel Emoji Upgrades Gadget Printers G Suite Crowdsourcing Personal Information Supercomputer Botnet CrashOverride Motion Sickness Cortana 3D Printing Staffing Administrator Taxes Machine Learning BDR Web Server Processors what was your? IT Budget Virtualization Unsupported Software GPS Update Regulation IT Consultant Computer Repair Relocation Cameras Mobile Device Management Meetings Mobile Data Tracking

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3