Data leakage, according to
The survey clearly informs us that cyber-attacks are rampant everywhere and companies can do something about it. Businesses can create robust talent security in order to prevent the accident from happening. As cited in Cyber Security Breaches Survey 2019, businesses are doing more attempts to save their company from
See also: Zero Trust to Reinvent Security Strategy in Business
While businesses have identified breaches robustly than ever before, they remain in
If companies cannot implement the basic protocol in a better way, even a robust technology or a top cyber talent will be less useful.
One of the oldest security forms, login and logout procedure could risk your data. Employees, especially technical employees and human resources, often access company data from their laptop or handphone. However, you might be surprised that most employees do not bother to log out of their computer when leaving for lunch. Some employees might even never log out their company account from their phones, leaving their data unguarded on a daily basis.
According to survey on cyberattack, screen or visual hacking commonly happens globally. In some states, the survey on cyberattack found that sensitive information was successfully captured in 91 percent of visual hacking. Meanwhile, 52 percent of sensitive information captured during the experiments came from employee computer screens. Employees often take or leave notes about important access such as login information and stores it on their computers. To make it worse, some might make notes and leave it on obvious locations such as a desk or phone. It will greater the chance of cybercriminals to import data from their computer. Worse, attackers might steal a laptop or phone from your employees and take important data from it.
While businesses are aware of these issues and have improved their data security, basic understanding must never be left behind. Companies should create awareness amongst their employees on protecting data. Regular reminder of small actions such as logging out before turning off the computer, locking up the office before leaving, or avoiding to take save important notes in an obvious place and ongoing training will also be needed to create better login and log out behaviour.
“Understanding the facts of small situation is only the first step. As an employer, you need to work continuously in order to create a security-conscious work environment.” – Creekmore Marketing
Read also: The Importance of Cyber-Security in Cyber-Workplace: Conversation with Parvinder Walia