Infographic: How to Promote Information Security in the Workplace
We were so impressed by the important data presented in this infographic (below) by the University of Alabama at Birmingham that we’re featuring it as a guest blog post.
Did you know that the biggest threat to your organization’s data/information security could be you?
You, the owner.
You, the senior manager.
You, the hard working employee.
Data security is, and rightly so, a top concern for management professionals. Security breaches threaten the livelihood of employees, or even entire companies when the breach is severe.
But don’t rush to blame employees—the biggest security threats don’t always come from the most obvious places.
Some risky security practices occur at the highest level:
87% of business owners regularly upload work files to a personal email or cloud account.
51% of senior managers have taken job files with them after leaving a job.
To understand the source of security breaches you must first understand the statistics surrounding typical workplace data security breaches. For instance, did you know that the top security mistakes are so commonplace that at least one of them will occur in your organization today? Or that 15% of employees believe they have zero to minimal responsibility to protect data stored on their personal devices.
Take a look at these stats, and then we’ll talk about how to prevent these scenarios in your organization:
Avoid these risks by implementing a strong, written security policy and regular information security training
You can avoid becoming one of these statistics. There are solutions available to most common professional data security problems:
A written security policy—which must include a solid password protection policy—should form the foundation of your data security practices.
Frequent security training should include everyone on the team from the top down. When awareness is allowed to slip, security practices slip along with it.
Every machine or device that provides access to your network system—including employee owned devices and mobile phones—should and can be protected with IT security software customized for your organizations’ needs.
Thank you to the University of Alabama at Birmingham’s Online Master of Science in Management Information Systems program for producing the great infographic.
Latest posts by Jordan True (see all)
- Bob Gagnon, Vice President of Channel Sales at Thycotic Recognized as 2017 CRN® Channel Chief for the Sixth Year in a Row - February 20, 2017
- Thycotic Confirms Need for Security Delivered in the Cloud with More Than 500 Customers Adopting its New Privileged Password Cloud Solution - February 9, 2017
- Thycotic’s Secret Server Cloud Wins 2017 BIG Innovation Award - February 7, 2017