Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Study Finds an Organization’s Greatest Security Risk isn’t Who You’d Expect

Study Finds an Organization’s Greatest Security Risk isn’t Who You’d Expect

The more users on your network, the more risk that user error could create a costly mistake for your infrastructure. While untrained employees could certainly ignore security policies, the greatest risk to your organization is an unexpected one. Research has proven that your company’s CEO, as well as other C-suite employees, hold one of the greatest risks for your business’ security.

For example, consider just how much sensitive data a CEO has access to. A normal employee may only be able to access information that they directly need for their position, but a CEO’s unique responsibilities require access to just about all data on the infrastructure. In fact, they can access just about anything that they want, which places them at unique risk.

Plus, CEOs usually have a poor work-life balance, putting in far more hours than others within the organization. A CEO who accesses the company network for 60+ hours a week will naturally be a larger risk than one who only accesses it 40 hours a week.

These factors all become magnified when you consider that CEOs use mobile devices to carry out many of their duties. Since they must always be connected to the office, a CEO’s mobile device may unintentionally become cluttered with company records or sensitive information--certainly more so than a normal employee’s personal device.

In the event that an employee has two separate devices for their work and personal life (something that CEOs often can’t accomplish), data leakage can become a problem, resulting in a breach that could expose data to hackers. While CEOs may get to enjoy the flexibility of not being tethered to the office, this risk is considerable, to say the least.

This is even more of a problem while out of the office on public Wi-Fi connections, like those offered at coffee shops, cafes, conference centers, airports, and pretty much everywhere. Hackers tend to exploit public Wi-Fi hotspots because they know they are often unsecured, and the volume of users on them means a surefire target. This is why most technology professionals will suggest avoiding public Wi-Fi whenever possible unless you’re accessing your infrastructure through a secure virtual private network.

A 2017 security report by iPass reinforces these statements with hard proof that public Wi-Fi hot spots are major problems for business owners and other executives. The riskiest connections are as followed:

  • Coffee shops and cafés, 42 percent.
  • Airports, 30 percent.
  • Hotels, 16 percent.
  • Exhibition centers, 7 percent.
  • Airplanes, 4 percent.

Therefore, you need to ask yourself how often your C-suite employees work outside the security and safety of your in-house network. The more time they spend doing business from these risky locations, the more unnecessary risk you’re exposing your business to.

There are even special attacks designed to target CEOs: whaling scams. These scammers take the time to properly research your business and its upper-level executives in an attempt to pull various stunts, including email scams, phone calls, traditional paper mailings, and plenty of other means. Unlike other spam campaigns, these scams are designed to target the deepest, darkest fears of a CEO. On the other hand, there are scams designed to impersonate the CEO in an attempt to convince other employees to wire transfer funds to offshore banking accounts. Either way, CEO fraud is a lucrative endeavor for hackers, and you need to prepare for it.

In order to prevent CEOs and other C-suite employees from becoming large risks to your business, you need to implement additional security measures that specifically take these threats into account. Implementing a solid BYOD policy and enterprise-level security solutions can be a great counter-measure. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 18 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Malware Hackers Business Computing Microsoft Hosted Solutions Internet Software Ransomware Computer IT Services Network Security Google Windows Windows 10 Backup Business Smartphone Innovation Android App Hardware Small Business Data Management Data Business Continuity Cloud Computing User Tips Browser Internet of Things Tip of the week Remote Monitoring Saving Money Mobile Devices IT Support Productivity Phishing Managed IT Services Data storage Productivity Big Data Cybersecurity Smartphones IT Support Facebook Efficiency Risk Management Outsourced IT Artificial Intelligence Settings Robot Office 365 Google Drive Upgrade Word Data Recovery Office Tips Gmail Microsoft Office Disaster Recovery Employer-Employee Relationship Windows 10 Passwords Money Outlook Monitors LiFi Save Money Managed Service Provider Administration Unified Threat Management Content Filtering Mouse Managed IT Services Miscellaneous Vulnerability Analytics Apple SaaS Maintenance IT Management Virtual Private Network Network Encryption Mobile Device Computing Chrome Hosted Solution Server Antivirus Workplace Tips End of Support Telephone Systems Alert YouTube communications Social Media File Sharing Unified Communications SharePoint Sports Touchscreen Drones Solid State Drive Hacker Managed IT Lenovo The Internet of Things Display Websites Downloads Hard Disk Drive Alt Codes Shortcut VoIP Superfish Cybercrime WiFi Two-factor Authentication Marketing Cabling Budget Humor Typing Government Patch Management Scam How To Customer Relationship Management Automation Current Events Multi-Factor Security Heating/Cooling Infrastructure Cryptocurrency BYOD Virtual Reality IT solutions Networking Firefox Communication Digital Payment Going Green Google Calendar Servers Disaster Storage Bitcoin VPN Data Security Running Cable Writing Printing Legal Legislation Buisness Server Management Uninterrupted Power Supply IBM Dark Data Computer Care Windows 8 Virtual Desktop Techology Laptop Quick Tips Retail Wireless Deep Learning Tablet Statistics Mail Merge Corporate Profile Customer Service Training Spam Unified Threat Management VoIP Office Automobile Operating System Bring Your Own Device Downtime Bluetooth Vendor Management Dell Address WannaCry Social User Error Avoiding Downtime Social Engineering Gadgets Google Maps Information Technology Best Practice Data Backup Data loss Bandwidth Apps Printer Halloween Time Management Safety Users desktop Google Docs Search Emergency Digital Network Congestion Hacks Politics Education Collaboration Access Control Scary Stories Network Management Firewall Google Wallet Business Growth Samsung Website Business Technology Spyware Computers Password Notifications Computer Repair Identity Theft Mobile Device Management Travel How To G Suite Crowdsourcing Health Black Market CrashOverride Supercomputer Mobile Computing Botnet Motion Sickness Taxes Electronic Medical Records Twitter IT Budget Machine Learning Upgrades IT Consultant Remote Computing Relocation Meetings 3D Printing Cleaning Work/Life Balance Private Cloud Webcam Unsupported Software Update Law Enforcement Error Point of Sale Mobile Data Ben McDonald shares Recovery Gadget Paperless Office Comparison Chromebook Staffing Administrator Web Server Processors Specifications Physical Security what was your? Emoji GPS Holiday Business Management Cameras Black Friday Personal Information Cortana Tracking CCTV Cyber Monday Wi-Fi Virtualization Document Management Tech Support

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3