Getting Your Staff to Understand How Important Security Is

Getting Your Staff to Understand How Important Security Is

Being a business owner in charge of new IT procedures can be a major pain, especially when it comes to your employees. How often do you experience pushback on any significant change to your IT infrastructure or policies? You’re not the only one--many organizations are in the same boat as you, and it can be a difficult situation to be in.

The average employee is either unaware of the everyday IT security threats or what could happen as a result of poor data sharing habits. They probably know a passable amount of password security best practices at the most, and even getting to this point can be difficult. We aren’t trying to sound negative--it just comes with the territory. You don’t hire your organization’s employees because they are tech-savvy (unless they are your IT department), but it’s still your responsibility to make sure they understand any new security initiative, as well as respond to any initial pushback.

To best illustrate this point, let’s take a look at password security:

An Examination of Employees Rejecting IT Security
Imagine this scenario; your IT provider creates a group policy that forces users to change their passwords every 30 days. Repeating the same password is out of the question, and it has to meet a certain complexity threshold in order to be accepted. You might think this is a great idea, but your employees are going to spit fire at you the second they find out what’s happened. If they don’t, they will let it simmer on the back-burner, complaining about the new policy to anyone who will listen. Eventually, you’ll find out about it, but this kind of scenario can quickly become a toxic work environment. You might have your organization’s best interests in mind, but your employees will only see it as an inconvenience.

This might seem on the extreme side, but you’d be surprised by how often this happens. Here are some other topics that might stoke the fire under your employees:

  • Bring Your Own Device Policies: If your employees use their personal devices for work purposes, it’s a best practice to have a BYOD policy in place. Your employees likely will push back against this, but in reality, it’s in the best interest of your network security to have it.
  • Firewalls and Content Filters: The Internet is a major time-waster, and you might be surprised to see how much time is wasted away by employees streaming video or lurking on message boards. The solution is to block these sites, even if it seems a bit extreme.
  • Implementing New Technologies: Any time you implement a new solution, you’ll experience pushback, even if it’s something like adding an application or moving data to the cloud. Some might adopt the the solution no problem, but others will fight to the bitter end just to keep to their old solutions.

Ultimately, just about anything new is enough to ruffle your employees’ feathers and create some difficult situations. They don’t care that you’re trying to protect your business--even if it’s in their best interest.

What Can You Do?
The biggest reason why your employees might push back against any change to your IT policies is simple; they want to get their job done as quickly and efficiently as possible, and they see change, whether it’s in the form of a new application or a password reset, as an inconvenience. Something meant to secure your network will look like a roadblock to your employees, and when it gets in the way of them doing their job, of course they will fight back.

It doesn't matter if you’re trying to improve the company as a whole. Someone on your staff is going to look at the new solution as a disruption of everything they know. Some might even see a BYOD policy or content filter as a sign that they aren’t to be trusted, when in reality it’s just to protect your organization from the possibility of a data breach. There’s only one solution to this goal, and it starts with you, the business owner.

Leadership is Key
If you want your employees to embrace change, it all starts at the top. Your C-level administrators and managers should also be on-board with any change going on in your workplace. It helps to show employees that they aren’t the only ones who have to abide by the rules--even their boss does. Remember, your job is to make sure your employees know why these solutions have to exist, and you have to remember that you don’t need their permission to do what’s best for your business.

If your business wants to improve network security, BNMC can help. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Hackers Business Computing Network Security Tech Term Business User Tips Computer Google Software Internet Microsoft IT Services Efficiency Productivity Hosted Solutions Ransomware Mobile Devices Communication Android IT Support Data Hardware Smartphone Small Business Backup Managed IT Services Saving Money Data Management Business Continuity Data Recovery Managed IT Services Windows 10 Windows Browser Innovation Cloud Computing Internet of Things Workplace Tips Data Backup Cybersecurity App Microsoft Office Business Management Productivity Facebook Server Phishing Mobile Device Office 365 Remote Monitoring Upgrade Artificial Intelligence Gmail Disaster Recovery Encryption Passwords Windows 10 Word Outsourced IT Managed Service Provider Employer-Employee Relationship Vulnerability Analytics Website communications Applications BYOD Infrastructure Network Smartphones IT Support Money Chrome Tip of the week Information Automation Antivirus Google Drive Bandwidth Users Content Filtering YouTube Miscellaneous Government Risk Management Social Media Access Control IT Management Router Office Tips Data storage Company Culture Maintenance Big Data VoIP Managed Service Save Money Robot Settings Wireless Avoiding Downtime LiFi Development Scam End of Support Hosted Solution Administration Virtual Reality Mouse Networking HIPAA Paperless Office SaaS VPN Education Mobile Security Apple Holiday Storage Data Security Data loss Business Technology Printing Unified Threat Management Server Management Alert Business Intelligence Virtual Private Network Telephone Systems Touchscreen desktop Quick Tips Laptop Display Hacker The Internet of Things Employee-Employer Relationship Firewall Vendor Management Monitors Downtime Outlook Spam Computing Operating System Managing Stress WiFi Two-factor Authentication Solid State Drive Patch Management Managed IT Service Social Star Wars Websites Gadgets User Error Mobility Chatbots Budget eWaste Specifications Typing Nanotechnology Humor Identity Theft Customer Relationship Management Co-Managed IT Wearable Technology Information Technology Network upgrade Safety Best Practice Motherboard Cables Training Corporate Profile Onboarding Alerts Current Events USB Heating/Cooling Multi-Factor Security Hard Disk Drive Slack Break Fix Fraud Cost Management Automobile Time Management Halloween Printer Print Toner Identity Remote Computing Continuity Dell Search Black Friday Cryptocurrency Screen Reader Charging Content Network Congestion Apps Smart Office Google Docs Wires WannaCry Emergency Digital Signage IT solutions Licensing Going Green Dongle Cabling Servers Google Calendar Solar Monitoring Dark Web Wi-Fi Hacks Assessment Google Maps Network Management Scary Stories Shortcuts Writing Cyber Monday Bitcoin Smart Tech Running Cable Streaming Computers Google Wallet Work Business Growth Voice over Internet Protocol Troubleshooting Dark Data Cooperation Update Service Level Agreement Buisness Legislation Compliance Legal Spying Virtual Desktop Microsoft Excel Hotspot Password Internet Exlporer Sports SharePoint Security Cameras Retail Managed IT Analysis Smart Technology Windows 8 Connectivity Politics Digital Payment Techology Human Error Unified Communications IT Technicians Drones Optimization Tablet Modem FinTech Digital How To Lenovo Customer Service Staff Leominster Disaster Statistics Office Deep Learning Regulations Samsung Mail Merge Blockchain Language Mobile Device Management Value Collaboration Downloads Shortcut Distributed Denial of Service IoT Tech Support VoIP Unified Threat Management Device Mirgation Recycling Bluetooth Comparison Alt Codes Cookies MSP Document Management Spyware Firefox Cybercrime Superfish LED Augmented Reality Chromebook K-12 Schools Uninterrupted Power Supply Social Engineering Bring Your Own Device Social Networking Computer Care IBM Address PowerPoint Permissions Computing Infrastructure Professional Services File Sharing Marketing Physical Security Error Twitter Upgrades Gadget Emoji Point of Sale Ben McDonald shares Crowdsourcing Travel G Suite Personal Information Botnet 3D Printing Supercomputer CrashOverride Cortana BDR Staffing Motion Sickness Taxes Machine Learning Administrator Processors Web Server what was your? Unsupported Software Regulation IT Budget Virtualization GPS IT Consultant Computer Repair Relocation Cameras Mobile Data How To Work/Life Balance Tracking Printers Recovery Meetings Cleaning Health Private Cloud CCTV Black Market Law Enforcement Webcam Notifications Electronic Medical Records Mobile Computing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3