{"id":154740,"date":"2017-02-09T07:20:00","date_gmt":"2017-02-09T12:20:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/hackable-employees\/"},"modified":"2017-02-09T07:20:00","modified_gmt":"2017-02-09T12:20:00","slug":"hackable-employees","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/hackable-employees\/","title":{"rendered":"Hackable Employees"},"content":{"rendered":"

Hackable employees are the weak links in your company’s computer and software security. Learn how your organization can defend itself better against hackers.<\/h2>\n

The safety and security of your company’s intellectual property and the confidential data that you routinely collect, store and use may not be as robust as you think. As the owner or manager of an organization that maintains information subject to HIPAA privacy regulations or data that would destroy your bottom line if competitors got hold of it, security should be a top priority.<\/p>\n

\"hackable<\/p>\n

It’s especially crucial to consider what may be the weakest links in your company’s cybersecurity—your hackable employees. Given the fact that 93% of workers say they practice at least one severe form of data security (according to Entrepreneur<\/a>) and that 23% of employees would steal data from their job, you will want to take a closer look at your organization’s security protocols and correct any weaknesses.<\/p>\n

Common Aspects of Hackable Employees<\/strong><\/p>\n

Work with your Information Technology professionals to improve your organization’s security by focusing on the following five aspects of poor data management.<\/p>\n

Shadow IT<\/strong><\/p>\n

The bane of corporate IT departments, “shadow IT” refers to the practice of employees downloading unauthorized software for use on their work computers. They might have no ulterior motive to harm the company, such as wanting to use a new Web browser or a program to watch movies or play music during breaks.<\/p>\n

But failing to consult with IT and get permission to install software exposes your company to malware that could lead to identity theft and other cyber crimes.<\/p>\n

Weak Passwords<\/strong><\/p>\n

Employees who are lazy or who just do not realize the importance of using strong passwords can expose you to hackers bent on penetrating your network, vandalizing your website and stealing confidential documents.<\/p>\n

Have your IT department remind each worker about setting up stronger passwords, using numbers and letters and some uppercase characters. A convenient way to make a difficult-to-guess password is to have employees come up with a phrase and use the first letter of each word such as “Let’s go to the beach Saturday at 3” to make a password “LgttbSa3.”<\/p>\n

Access Continues Following Termination<\/strong><\/p>\n

Just as you would demand the key to the front door from a worker who is leaving your employ, you should always cut off their access to your computer systems. Change the employee’s computer password promptly (don’t forget to adjust the email login credentials and the password for voicemail).<\/p>\n

Personal Cloud Computing<\/strong><\/p>\n

Cloud computing makes it easier for employees to share information with one another as well as access their own files from different devices. Unfortunately, workers may be tempted to upload sensitive company data to their personal cloud storage accounts, which will likely not have the same robust protection your IT department implements for the official cloud computing services you rely on.<\/p>\n

Vulnerable to Social Engineering<\/strong><\/p>\n

Your IT staff should instruct employees not to write their passwords down on sticky notes attached to their computer monitor or on scraps of paper in the top drawer of their desk. A visitor may wander by the office and take note of the password.<\/p>\n

At the same time, IT should remind workers not to give out information on the phone to strangers that could be used to guess passwords. Social engineering helps hackers figure out passwords that then give them full access to a company’s proprietary information.<\/p>\n

For more details about how your business can protect itself against computer criminals stealing data because of employees failing to take security seriously, the team at {city}’s {company} is standing by to assist you. Contact us at {phone} or {email} today.<\/p>\n","protected":false},"excerpt":{"rendered":"

Hackable employees are the weak links in your company’s computer and software security. Learn how your organization can defend itself better against hackers. The safety and security of your company’s intellectual property and the confidential data that you routinely collect, store and use may not be as robust as you think. As the owner or…<\/p>\n","protected":false},"author":5,"featured_media":154742,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-154740","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\nHackable Employees - IT Services in Virginia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ntegrait.com\/hackable-employees\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackable Employees - IT Services in Virginia\" \/>\n<meta property=\"og:description\" content=\"Hackable employees are the weak links in your company’s computer and software security. Learn how your organization can defend itself better against hackers. The safety and security of your company’s intellectual property and the confidential data that you routinely collect, store and use may not be as robust as you think. As the owner or…\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ntegrait.com\/hackable-employees\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Services in Virginia\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-09T12:20:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogfeed.ulistic-projects.com\/wp-content\/uploads\/2017\/02\/ThinkstockPhotos-530437128.jpg\" \/>\n<meta name=\"author\" content=\"Steve West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ntegrait.com\/hackable-employees\/\",\"url\":\"https:\/\/www.ntegrait.com\/hackable-employees\/\",\"name\":\"Hackable Employees - IT Services in Virginia\",\"isPartOf\":{\"@id\":\"https:\/\/www.ntegrait.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ntegrait.com\/hackable-employees\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ntegrait.com\/hackable-employees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2017\/02\/ThinkstockPhotos-530437128-1.jpg\",\"datePublished\":\"2017-02-09T12:20:00+00:00\",\"dateModified\":\"2017-02-09T12:20:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.ntegrait.com\/hackable-employees\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ntegrait.com\/hackable-employees\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/hackable-employees\/#primaryimage\",\"url\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2017\/02\/ThinkstockPhotos-530437128-1.jpg\",\"contentUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2017\/02\/ThinkstockPhotos-530437128-1.jpg\",\"width\":508,\"height\":339},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ntegrait.com\/hackable-employees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ntegrait.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackable Employees\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ntegrait.com\/#website\",\"url\":\"https:\/\/www.ntegrait.com\/\",\"name\":\"IT Services in Virginia\",\"description\":\"Ntegra IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ntegrait.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\",\"name\":\"Steve West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"caption\":\"Steve West\"},\"description\":\"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.\",\"url\":\"https:\/\/ntegrait.com\/author\/swestntegrait-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackable Employees - IT Services in Virginia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ntegrait.com\/hackable-employees\/","og_locale":"en_US","og_type":"article","og_title":"Hackable Employees - IT Services in Virginia","og_description":"Hackable employees are the weak links in your company’s computer and software security. Learn how your organization can defend itself better against hackers. The safety and security of your company’s intellectual property and the confidential data that you routinely collect, store and use may not be as robust as you think. As the owner or…","og_url":"https:\/\/www.ntegrait.com\/hackable-employees\/","og_site_name":"IT Services in Virginia","article_published_time":"2017-02-09T12:20:00+00:00","og_image":[{"url":"https:\/\/blogfeed.ulistic-projects.com\/wp-content\/uploads\/2017\/02\/ThinkstockPhotos-530437128.jpg","type":"","width":"","height":""}],"author":"Steve West","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve West","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ntegrait.com\/hackable-employees\/","url":"https:\/\/www.ntegrait.com\/hackable-employees\/","name":"Hackable Employees - IT Services in Virginia","isPartOf":{"@id":"https:\/\/www.ntegrait.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ntegrait.com\/hackable-employees\/#primaryimage"},"image":{"@id":"https:\/\/www.ntegrait.com\/hackable-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2017\/02\/ThinkstockPhotos-530437128-1.jpg","datePublished":"2017-02-09T12:20:00+00:00","dateModified":"2017-02-09T12:20:00+00:00","author":{"@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79"},"breadcrumb":{"@id":"https:\/\/www.ntegrait.com\/hackable-employees\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ntegrait.com\/hackable-employees\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/hackable-employees\/#primaryimage","url":"https:\/\/ntegrait.com\/wp-content\/uploads\/2017\/02\/ThinkstockPhotos-530437128-1.jpg","contentUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2017\/02\/ThinkstockPhotos-530437128-1.jpg","width":508,"height":339},{"@type":"BreadcrumbList","@id":"https:\/\/www.ntegrait.com\/hackable-employees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ntegrait.com\/"},{"@type":"ListItem","position":2,"name":"Hackable Employees"}]},{"@type":"WebSite","@id":"https:\/\/www.ntegrait.com\/#website","url":"https:\/\/www.ntegrait.com\/","name":"IT Services in Virginia","description":"Ntegra IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ntegrait.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79","name":"Steve West","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","caption":"Steve West"},"description":"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.","url":"https:\/\/ntegrait.com\/author\/swestntegrait-com\/"}]}},"_links":{"self":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/154740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/comments?post=154740"}],"version-history":[{"count":0,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/154740\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media\/154742"}],"wp:attachment":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media?parent=154740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/categories?post=154740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/tags?post=154740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}