Thycotic Telephone Number +1-202-802-9399 (US)
The Lockdown

Thycotic’s Cyber Security Blog

Infographic: How to Promote Information Security in the Workplace

Written by Jordan True

January 5th, 2017

We were so impressed by the important data presented in this infographic (below) by the University of Alabama at Birmingham that we’re featuring it as a guest blog post.

Did you know that the biggest threat to your organization’s data/information security could be you?

You, the owner.

You, the senior manager.

You, the hard working employee.

Data security is, and rightly so, a top concern for management professionals. Security breaches threaten the livelihood of employees, or even entire companies when the breach is severe.

But don’t rush to blame employees—the biggest security threats don’t always come from the most obvious places.

Some risky security practices occur at the highest level:

87% of business owners regularly upload work files to a personal email or cloud account.

51% of senior managers have taken job files with them after leaving a job.

To understand the source of security breaches you must first understand the statistics surrounding typical workplace data security breaches. For instance, did you know that the top security mistakes are so commonplace that at least one of them will occur in your organization today? Or that 15% of employees believe they have zero to minimal responsibility to protect data stored on their personal devices.

Take a look at these stats, and then we’ll talk about how to prevent these scenarios in your organization:

Data Security & Information Security in the Workplace | Infographic | Statistics

Avoid these risks by implementing a strong, written security policy and regular information security training

You can avoid becoming one of these statistics. There are solutions available to most common professional data security problems:

A written security policy—which must include a solid password protection policy—should form the foundation of your data security practices.

Frequent security training should include everyone on the team from the top down. When awareness is allowed to slip, security practices slip along with it.

Every machine or device that provides access to your network system—including employee owned devices and mobile phones—should and can be protected with IT security software customized for your organizations’ needs.


Get updates, free resources and in-depth how-to's

Thank you to the University of Alabama at Birmingham’s Online Master of Science in Management Information Systems program for producing the great infographic.


Like this post?

Get our top blog posts delivered to your inbox once a month.


The following two tabs change content below.

Jordan True

Jordan is a social media strategist, digital community manager and a lover of all things IT. She currently manages the Social Media Program at Thycotic and loves to connect with technology communities online and at enterprise IT events. Addicted to the outdoors, you can find Jordan on the running trails in her free time or sharing the latest InfoSec buzz on Twitter @ThycoticJordan.