Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!

The Lockdown

Thycotic’s Cyber Security Blog

Infographic: How to Promote Information Security in the Workplace

Written by Jordan True

January 5th, 2017

We were so impressed by the important data presented in this infographic (below) by the University of Alabama at Birmingham that we’re featuring it as a guest blog post.

Did you know that the biggest threat to your organization’s data/information security could be you?

You, the owner.

You, the senior manager.

You, the hard working employee.

Data security is, and rightly so, a top concern for management professionals. Security breaches threaten the livelihood of employees, or even entire companies when the breach is severe.

But don’t rush to blame employees—the biggest security threats don’t always come from the most obvious places.

Some risky security practices occur at the highest level:

87% of business owners regularly upload work files to a personal email or cloud account.

51% of senior managers have taken job files with them after leaving a job.

To understand the source of security breaches you must first understand the statistics surrounding typical workplace data security breaches. For instance, did you know that the top security mistakes are so commonplace that at least one of them will occur in your organization today? Or that 15% of employees believe they have zero to minimal responsibility to protect data stored on their personal devices.

Take a look at these stats, and then we’ll talk about how to prevent these scenarios in your organization:

Avoid these risks by implementing a strong, written security policy and regular information security training

You can avoid becoming one of these statistics. There are solutions available to most common professional data security problems:

A written security policy—which must include a solid password protection policy—should form the foundation of your data security practices.

Frequent security training should include everyone on the team from the top down. When awareness is allowed to slip, security practices slip along with it.

Every machine or device that provides access to your network system—including employee owned devices and mobile phones—should and can be protected with IT security software customized for your organizations’ needs.

Thank you to the University of Alabama at Birmingham’s Online Master of Science in Management Information Systems program for producing the great infographic.


Like this post?

Get our top blog posts delivered to your inbox once a month.