Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Study Finds an Organization’s Greatest Security Risk isn’t Who You’d Expect

Study Finds an Organization’s Greatest Security Risk isn’t Who You’d Expect

The more users on your network, the more risk that user error could create a costly mistake for your infrastructure. While untrained employees could certainly ignore security policies, the greatest risk to your organization is an unexpected one. Research has proven that your company’s CEO, as well as other C-suite employees, hold one of the greatest risks for your business’ security.

For example, consider just how much sensitive data a CEO has access to. A normal employee may only be able to access information that they directly need for their position, but a CEO’s unique responsibilities require access to just about all data on the infrastructure. In fact, they can access just about anything that they want, which places them at unique risk.

Plus, CEOs usually have a poor work-life balance, putting in far more hours than others within the organization. A CEO who accesses the company network for 60+ hours a week will naturally be a larger risk than one who only accesses it 40 hours a week.

These factors all become magnified when you consider that CEOs use mobile devices to carry out many of their duties. Since they must always be connected to the office, a CEO’s mobile device may unintentionally become cluttered with company records or sensitive information--certainly more so than a normal employee’s personal device.

In the event that an employee has two separate devices for their work and personal life (something that CEOs often can’t accomplish), data leakage can become a problem, resulting in a breach that could expose data to hackers. While CEOs may get to enjoy the flexibility of not being tethered to the office, this risk is considerable, to say the least.

This is even more of a problem while out of the office on public Wi-Fi connections, like those offered at coffee shops, cafes, conference centers, airports, and pretty much everywhere. Hackers tend to exploit public Wi-Fi hotspots because they know they are often unsecured, and the volume of users on them means a surefire target. This is why most technology professionals will suggest avoiding public Wi-Fi whenever possible unless you’re accessing your infrastructure through a secure virtual private network.

A 2017 security report by iPass reinforces these statements with hard proof that public Wi-Fi hot spots are major problems for business owners and other executives. The riskiest connections are as followed:

  • Coffee shops and cafés, 42 percent.
  • Airports, 30 percent.
  • Hotels, 16 percent.
  • Exhibition centers, 7 percent.
  • Airplanes, 4 percent.

Therefore, you need to ask yourself how often your C-suite employees work outside the security and safety of your in-house network. The more time they spend doing business from these risky locations, the more unnecessary risk you’re exposing your business to.

There are even special attacks designed to target CEOs: whaling scams. These scammers take the time to properly research your business and its upper-level executives in an attempt to pull various stunts, including email scams, phone calls, traditional paper mailings, and plenty of other means. Unlike other spam campaigns, these scams are designed to target the deepest, darkest fears of a CEO. On the other hand, there are scams designed to impersonate the CEO in an attempt to convince other employees to wire transfer funds to offshore banking accounts. Either way, CEO fraud is a lucrative endeavor for hackers, and you need to prepare for it.

In order to prevent CEOs and other C-suite employees from becoming large risks to your business, you need to implement additional security measures that specifically take these threats into account. Implementing a solid BYOD policy and enterprise-level security solutions can be a great counter-measure. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 18 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Computing Internet Microsoft Hosted Solutions Business Ransomware Software Android IT Services Smartphone Windows Google Network Security Computer Small Business Windows 10 Backup App Hardware Data Management Data Business Continuity Browser Innovation Internet of Things Mobile Devices Saving Money Office 365 Artificial Intelligence Encryption Managed IT Services Productivity Cloud Computing User Tips Phishing Data Recovery Smartphones Outsourced IT Tip of the week IT Support Remote Monitoring Robot Risk Management Google Drive Upgrade Word Settings Data storage Productivity Cybersecurity Money IT Support Gmail Office Tips Big Data Windows 10 Facebook Managed Service Provider Vulnerability Efficiency Analytics IT Management End of Support Holiday Virtual Private Network Telephone Systems Business Management Alert Network Firewall Chrome Microsoft Office Hosted Solution Server Employer-Employee Relationship Antivirus Data Backup Bandwidth Workplace Tips Outlook YouTube Monitors Save Money Social Media Government communications Automation Mouse Unified Threat Management Managed IT Services Miscellaneous Disaster Recovery Apple Maintenance Passwords SaaS Two-factor Authentication LiFi Scam Administration Content Filtering Mobile Device Computing WannaCry Social Google Calendar Servers VPN Social Engineering Google Maps Information Technology Dark Web Best Practice Data Security Running Cable Buisness Data loss Legislation Server Management Virtual Desktop Safety Microsoft Excel Google Docs Techology Quick Tips Laptop desktop Digital Network Congestion Hacks Politics Tablet Deep Learning Statistics Mail Merge Google Wallet Collaboration Blockchain Business Growth Samsung Unified Threat Management Spam VoIP Wi-Fi Downtime Spyware Computers Password Comparison Bring Your Own Device Bluetooth Address Drones File Sharing Permissions Gadgets Hacker User Error Avoiding Downtime Solid State Drive Display Websites Specifications Fraud Users Alt Codes Printer Apps Time Management Halloween Hard Disk Drive Search Black Friday Mobile Security Emergency Education Cabling Budget Humor Typing Access Control Network Management Scary Stories Website How To Current Events Cyber Monday Hotspot Business Technology Infrastructure Sports Cryptocurrency BYOD SharePoint Unified Communications Touchscreen Virtual Reality Managed IT Firefox Communication Digital Payment Going Green Smart Technology Language Lenovo The Internet of Things Disaster Storage Bitcoin Downloads Shortcut Writing VoIP Printing Distributed Denial of Service Computing Infrastructure Superfish WiFi Cybercrime Uninterrupted Power Supply Legal IBM Dark Data Marketing Computer Care Windows 8 Patch Management Retail Wireless Managed IT Service Alerts Customer Relationship Management Corporate Profile Customer Service Training Multi-Factor Security Heating/Cooling Office Automobile Break Fix Operating System Networking IT solutions Vendor Management Dell Chromebook Staffing Administrator Web Server Processors Physical Security what was your? Emoji GPS Cameras Personal Information Cortana Tracking CCTV Virtualization Document Management Tech Support Notifications Computer Repair Identity Theft Mobile Device Management How To Travel G Suite Crowdsourcing Health Black Market CrashOverride Supercomputer Mobile Computing Botnet Motion Sickness Taxes Electronic Medical Records Twitter IT Budget Machine Learning Upgrades IT Consultant Remote Computing Relocation Meetings 3D Printing Cleaning Work/Life Balance Private Cloud Webcam Unsupported Software Law Enforcement Update Error Point of Sale Mobile Data Ben McDonald shares Recovery Gadget Paperless Office Licensing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3