Bredy Network Management Corporation Blogs

3 minutes reading time (611 words)

Study Finds an Organization’s Greatest Security Risk isn’t Who You’d Expect

Study Finds an Organization’s Greatest Security Risk isn’t Who You’d Expect

The more users on your network, the more risk that user error could create a costly mistake for your infrastructure. While untrained employees could certainly ignore security policies, the greatest risk to your organization is an unexpected one. Research has proven that your company’s CEO, as well as other C-suite employees, hold one of the greatest risks for your business’ security.

For example, consider just how much sensitive data a CEO has access to. A normal employee may only be able to access information that they directly need for their position, but a CEO’s unique responsibilities require access to just about all data on the infrastructure. In fact, they can access just about anything that they want, which places them at unique risk.

Plus, CEOs usually have a poor work-life balance, putting in far more hours than others within the organization. A CEO who accesses the company network for 60+ hours a week will naturally be a larger risk than one who only accesses it 40 hours a week.

These factors all become magnified when you consider that CEOs use mobile devices to carry out many of their duties. Since they must always be connected to the office, a CEO’s mobile device may unintentionally become cluttered with company records or sensitive information--certainly more so than a normal employee’s personal device.

In the event that an employee has two separate devices for their work and personal life (something that CEOs often can’t accomplish), data leakage can become a problem, resulting in a breach that could expose data to hackers. While CEOs may get to enjoy the flexibility of not being tethered to the office, this risk is considerable, to say the least.

This is even more of a problem while out of the office on public Wi-Fi connections, like those offered at coffee shops, cafes, conference centers, airports, and pretty much everywhere. Hackers tend to exploit public Wi-Fi hotspots because they know they are often unsecured, and the volume of users on them means a surefire target. This is why most technology professionals will suggest avoiding public Wi-Fi whenever possible unless you’re accessing your infrastructure through a secure virtual private network.

A 2017 security report by iPass reinforces these statements with hard proof that public Wi-Fi hot spots are major problems for business owners and other executives. The riskiest connections are as followed:

  • Coffee shops and cafés, 42 percent.
  • Airports, 30 percent.
  • Hotels, 16 percent.
  • Exhibition centers, 7 percent.
  • Airplanes, 4 percent.

Therefore, you need to ask yourself how often your C-suite employees work outside the security and safety of your in-house network. The more time they spend doing business from these risky locations, the more unnecessary risk you’re exposing your business to.

There are even special attacks designed to target CEOs: whaling scams. These scammers take the time to properly research your business and its upper-level executives in an attempt to pull various stunts, including email scams, phone calls, traditional paper mailings, and plenty of other means. Unlike other spam campaigns, these scams are designed to target the deepest, darkest fears of a CEO. On the other hand, there are scams designed to impersonate the CEO in an attempt to convince other employees to wire transfer funds to offshore banking accounts. Either way, CEO fraud is a lucrative endeavor for hackers, and you need to prepare for it.

In order to prevent CEOs and other C-suite employees from becoming large risks to your business, you need to implement additional security measures that specifically take these threats into account. Implementing a solid BYOD policy and enterprise-level security solutions can be a great counter-measure. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Software Internet Hosted Solutions Ransomware Business Computer Network Security Microsoft Google Android Mobile Devices IT Services Smartphone Managed IT Services Backup Data Management Windows Internet of Things Tech Term Browser Cloud Computing Innovation App Business Continuity Hardware Windows 10 Small Business Remote Monitoring Data Server Artificial Intelligence Data Recovery User Tips Saving Money Encryption IT Support Infrastructure Business Management Managed Service Provider Phishing Gmail Outsourced IT Efficiency IT Support Productivity Cybersecurity Tip of the week Data Backup Smartphones Office 365 Productivity Vulnerability Government Settings Chrome Managed IT Services Facebook IT Management Word Data storage Money Risk Management Windows 10 Social Media Robot Office Tips Disaster Recovery Google Drive Antivirus Bandwidth Big Data Upgrade Communication Passwords SaaS Unified Threat Management Analytics Apple HIPAA Data loss Telephone Systems communications Storage Mobile Security Holiday VPN Data Security Applications Microsoft Office BYOD Business Technology Firewall Alert Workplace Tips Server Management Maintenance Network Virtual Private Network YouTube Spam Computing Monitors Outlook Vendor Management WiFi Employer-Employee Relationship Website Save Money LiFi Mobile Device Hosted Solution Automation Two-factor Authentication Administration End of Support Paperless Office Scam Content Filtering Mouse The Internet of Things Virtual Reality Miscellaneous Downtime Networking Cybercrime Search Black Friday Education Hacks Screen Reader Marketing Emergency Google Wallet Licensing Dongle Writing Servers Google Calendar Bitcoin Wi-Fi Digital Payment Printing Assessment Computers Network Management Access Control desktop Business Growth Gadgets Dark Web Smart Tech Dark Data Disaster Legal Cyber Monday Digital Password Collaboration Unified Communications Drones Cooperation Service Level Agreement Retail Legislation Windows 8 Router Microsoft Excel Hotspot Internet Exlporer Display Touchscreen SharePoint Hacker Compliance Politics Users Halloween Connectivity Customer Service Quick Tips Techology Uninterrupted Power Supply Deep Learning IT Technicians Managed IT Smart Technology Document Management Spyware How To Lenovo File Sharing Staff Leominster Office Samsung Statistics Tablet Computer Care IBM Modem Mail Merge Blockchain Wireless Language Value Downloads Solid State Drive Alt Codes Regulations Tech Support Scary Stories Identity Theft IoT Chromebook VoIP Unified Threat Management Bring Your Own Device Operating System Mirgation Running Cable Shortcut Distributed Denial of Service Buisness Firefox Superfish Budget Augmented Reality K-12 Schools Social Engineering Bluetooth Comparison Training Corporate Profile Social Cookies Address Permissions Automobile Information Technology Computing Infrastructure Professional Services Virtual Desktop Hard Disk Drive Typing Humor Social Networking Websites Sports Current Events Star Wars Avoiding Downtime User Error Dell Best Practice Chatbots Laptop Patch Management Managed IT Service Customer Relationship Management Cabling Wearable Technology Network upgrade Safety Specifications WannaCry Nanotechnology Google Maps Apps Alerts USB Remote Computing Heating/Cooling Multi-Factor Security Cryptocurrency Motherboard IT solutions Going Green Fraud Cost Management Network Congestion VoIP Time Management Printer Google Docs Identity Break Fix Smart Office GPS Processors IT Consultant BDR Machine Learning Virtualization Cameras Unsupported Software Update Meetings Work Tracking Cleaning Computer Repair Relocation CCTV Mobile Data Recovery Webcam Optimization How To Work/Life Balance Mobile Device Management Health Private Cloud Error Black Market Mobile Computing Point of Sale Ben McDonald shares Recycling Law Enforcement Travel Notifications Electronic Medical Records Twitter G Suite Physical Security Supercomputer CrashOverride Emoji eWaste Upgrades Gadget Motion Sickness Crowdsourcing Staffing Administrator Taxes Personal Information Botnet IT Budget Cortana Web Server what was your? 3D Printing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3