We are open for business! Read more about our COVID-19 safety precautions, including virtual surveys, and our return-to-work strategy.

Cyber Threats and Relocation: Keeping Your Company and Employees Safe and Secure

Contrary to many TV shows and movies, most data hacks aren’t solely the work of a computer mastermind. One of the biggest

Data security poster

Contrary to many TV shows and movies, most data hacks aren’t solely the work of a computer mastermind. One of the biggest risks a company faces is from those employees who have access to sensitive information like customer records.

While some data security incidents can be caused by a disgruntled employee who maliciously steals and/or releases the information, two common causes of data hacks are from an employee accidentally releasing malware into your system and third-party businesses and partners who compromise the data.

According to a 2017 Dell survey, nearly half (45%) of employees engage in some amount of unsafe behavior during the workday. These actions can include connecting to unsafe WIFI or a personal email to access confidential work and losing a company work device.

How to protect your organization

After all this, it might seem like a forgone conclusion that a data hack is imminent for your company. While no company should consider themselves immune from one, there are a number of steps and safeguards organizations can implement to protect themselves from cyber threats. These include having a formalized data security policy and incorporating data security best practices into your employee onboarding and ongoing training.

Most common phishing scams

According to Symantec’s 2017 Internet Security Threat Report, email remains the most common entry point for malware into an organization. Some of the most common “tricks” for hackers that employees should look out for include:

  • Dangerous attachments and links – particularly invoices:One of the ways hackers are most successful in gaining access to a company’s network is by sending employees emails with fraudulent links or attachments that appear to be about important business matters – most commonly, invoices. It’s not a surprise, no one wants to be late on an invoice. However, these often include an .exe file that runs a program designed to give a hacker remote access to the computer.
  • Slightly “off” email addresses:The general rule of thumb is to only open messages from known contacts. So, naturally, hackers are now attempting to have their messages appear to be from someone the recipient already knows or a seemingly reputable organization. They’ll do so by changing a letter or adding a hyphen to the email domain. For example, an email domain may normally appear as “@companyname.com,” whereas the fraudulent version would appear as, “@company-name.com.” If the tone or content of a message appears off, look to see if the email address is a fake one.
  • “You’ve been hacked” popup:Another common trick are popups alerting a person of a hack. They look and read like an official warning, urging the user to either click on a link or install a program to resolve the problem. What this really does is give a hacker access to the computer, and subsequently, the network to which it is connected.

There’s a lot companies and individuals can do to protect themselves from data hacks – much more than we can relay in a single blog post. Click the image below to download our latest white paper – Big Data, Cyber Threats and Relocation: How to Keep Your Organization’s Data Secure in Times of Transition! 

 Data security poster