Getting Your Staff to Understand How Important Security Is

Getting Your Staff to Understand How Important Security Is

Being a business owner in charge of new IT procedures can be a major pain, especially when it comes to your employees. How often do you experience pushback on any significant change to your IT infrastructure or policies? You’re not the only one--many organizations are in the same boat as you, and it can be a difficult situation to be in.

The average employee is either unaware of the everyday IT security threats or what could happen as a result of poor data sharing habits. They probably know a passable amount of password security best practices at the most, and even getting to this point can be difficult. We aren’t trying to sound negative--it just comes with the territory. You don’t hire your organization’s employees because they are tech-savvy (unless they are your IT department), but it’s still your responsibility to make sure they understand any new security initiative, as well as respond to any initial pushback.

To best illustrate this point, let’s take a look at password security:

An Examination of Employees Rejecting IT Security
Imagine this scenario; your IT provider creates a group policy that forces users to change their passwords every 30 days. Repeating the same password is out of the question, and it has to meet a certain complexity threshold in order to be accepted. You might think this is a great idea, but your employees are going to spit fire at you the second they find out what’s happened. If they don’t, they will let it simmer on the back-burner, complaining about the new policy to anyone who will listen. Eventually, you’ll find out about it, but this kind of scenario can quickly become a toxic work environment. You might have your organization’s best interests in mind, but your employees will only see it as an inconvenience.

This might seem on the extreme side, but you’d be surprised by how often this happens. Here are some other topics that might stoke the fire under your employees:

  • Bring Your Own Device Policies: If your employees use their personal devices for work purposes, it’s a best practice to have a BYOD policy in place. Your employees likely will push back against this, but in reality, it’s in the best interest of your network security to have it.
  • Firewalls and Content Filters: The Internet is a major time-waster, and you might be surprised to see how much time is wasted away by employees streaming video or lurking on message boards. The solution is to block these sites, even if it seems a bit extreme.
  • Implementing New Technologies: Any time you implement a new solution, you’ll experience pushback, even if it’s something like adding an application or moving data to the cloud. Some might adopt the the solution no problem, but others will fight to the bitter end just to keep to their old solutions.

Ultimately, just about anything new is enough to ruffle your employees’ feathers and create some difficult situations. They don’t care that you’re trying to protect your business--even if it’s in their best interest.

What Can You Do?
The biggest reason why your employees might push back against any change to your IT policies is simple; they want to get their job done as quickly and efficiently as possible, and they see change, whether it’s in the form of a new application or a password reset, as an inconvenience. Something meant to secure your network will look like a roadblock to your employees, and when it gets in the way of them doing their job, of course they will fight back.

It doesn't matter if you’re trying to improve the company as a whole. Someone on your staff is going to look at the new solution as a disruption of everything they know. Some might even see a BYOD policy or content filter as a sign that they aren’t to be trusted, when in reality it’s just to protect your organization from the possibility of a data breach. There’s only one solution to this goal, and it starts with you, the business owner.

Leadership is Key
If you want your employees to embrace change, it all starts at the top. Your C-level administrators and managers should also be on-board with any change going on in your workplace. It helps to show employees that they aren’t the only ones who have to abide by the rules--even their boss does. Remember, your job is to make sure your employees know why these solutions have to exist, and you have to remember that you don’t need their permission to do what’s best for your business.

If your business wants to improve network security, BNMC can help. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Hackers Business Software Business Computing Network Security Internet Microsoft Computer Google IT Services Hosted Solutions Ransomware Tech Term User Tips Efficiency Mobile Devices Smartphone Small Business Android Communication Data Backup Managed IT Services Innovation Hardware Windows 10 Windows IT Support Data Management Internet of Things Data Recovery Saving Money Cloud Computing Browser Business Continuity Productivity Cybersecurity Productivity Data Backup Managed IT Services App Disaster Recovery Encryption Passwords Upgrade Business Management Facebook Server Remote Monitoring Workplace Tips Office 365 Gmail Word Artificial Intelligence Microsoft Office Applications Money Employer-Employee Relationship IT Support Windows 10 Tip of the week Smartphones Infrastructure Chrome Managed Service Provider Vulnerability Phishing Analytics communications Outsourced IT Network BYOD Website Office Tips Mobile Device Big Data Save Money Company Culture Robot Google Drive Content Filtering Antivirus Bandwidth Settings Miscellaneous Maintenance YouTube IT Management Government Risk Management Social Media Data storage Alert Spam Computing Display Outlook WiFi Business Intelligence Laptop Operating System Paperless Office LiFi The Internet of Things Vendor Management Hosted Solution Two-factor Authentication Monitors Administration VoIP Avoiding Downtime Scam Mouse Unified Threat Management Automation Data loss Telephone Systems Managing Stress End of Support Virtual Reality desktop Apple Education Development Storage VPN Firewall Managed Service Access Control Users Data Security SaaS HIPAA Business Technology Server Management Virtual Private Network Holiday Information Touchscreen Wireless Mobile Security Work How To Lenovo Onboarding Smart Tech Statistics Tablet Retail Identity Theft Buisness Service Level Agreement Mail Merge Blockchain Politics Virtual Desktop Slack Router Voice over Internet Protocol Downloads Training Corporate Profile Alt Codes Sports Cooperation Automobile Compliance VoIP Unified Threat Management Customer Service Hard Disk Drive Bring Your Own Device Content Hotspot Internet Exlporer Shortcut Distributed Denial of Service IT Technicians Optimization Firefox Superfish Dell Budget Digital Signage Connectivity Bluetooth Comparison Office Samsung Social Staff Leominster Address Permissions Cabling Tech Support Information Technology Monitoring Modem FinTech WannaCry Typing Humor Google Maps Current Events Regulations User Error Chromebook Best Practice Streaming Language Value Patch Management Managed IT Service Downtime Mirgation Recycling Customer Relationship Management Cybercrime Troubleshooting IoT Specifications Social Engineering Augmented Reality K-12 Schools Websites Apps Spying Cookies MSP Heating/Cooling Multi-Factor Security Marketing Cryptocurrency Break Fix IT solutions Going Green Analysis Social Networking Time Management Printer Gadgets Google Docs Human Error Computing Infrastructure Professional Services Hacks Chatbots eWaste Networking Star Wars Search Black Friday Safety Digital Payment Wearable Technology Network upgrade Emergency Disaster Google Wallet Employee-Employer Relationship Nanotechnology Servers Google Calendar Remote Computing Digital Bitcoin Dark Web Collaboration Printing Motherboard Cables Network Management Network Congestion Business Growth Halloween Device Alerts USB Password Identity Continuity Legal LED Fraud Cost Management Cyber Monday Smart Office Wi-Fi Uninterrupted Power Supply Unified Communications Drones PowerPoint Screen Reader Charging Legislation Writing Document Management Spyware Windows 8 Microsoft Excel File Sharing Wires SharePoint Computers Computer Care IBM Hacker Scary Stories Licensing Dongle Mobile Device Management Solar Quick Tips Techology Dark Data Update Solid State Drive Deep Learning Running Cable Co-Managed IT Assessment Managed IT Smart Technology Point of Sale Computer Repair Ben McDonald shares Relocation Regulation Travel Mobile Data How To Work/Life Balance Mobile Computing G Suite Recovery Health Private Cloud Supercomputer CrashOverride Motion Sickness Staffing Black Market Administrator Law Enforcement Taxes Web Server Electronic Medical Records what was your? IT Budget Notifications Physical Security GPS Twitter Upgrades Gadget IT Consultant Emoji Cameras Printers Crowdsourcing Meetings Personal Information Botnet Tracking 3D Printing Cleaning Cortana CCTV Webcam Machine Learning Processors Unsupported Software BDR Virtualization Error

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3