Let us be your IT department!
Call us Today! (703) 821-8200

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

With Great Power Comes a Greater Security Risk, Study Finds

With Great Power Comes a Greater Security Risk, Study Finds

Every user on your network adds an additional level of risk, whether it be risk of user error, making a mistake that causes a data breach, or worse. One would assume that a company’s biggest risk would come from an untrained employee that disregards security policies, but surprisingly, that’s not always the case. Research has shown that a company’s CEO along with the rest of its C-level executives are the greatest security risk.

There are multiple factors that go into this. Take for instance the sheer amount of sensitive data that a CEO has access to. Whereas an average employee may just have access to data pertaining to their job or their department, a CEO generally has carte blanche to access any data they desire.

Then there’s the fact that CEOs typically have a poor work-life balance. This means that they put in way more hours than the average employee. You don’t have to be an expert in risk assessment to understand that a user accessing a company’s network 60, 70, or even 80 hours each week is a far greater risk than a user that only accesses the network 40 hours per week.

Both of these factors contribute to another reason why CEOs make for such a large security risk: the mobile devices they carry. In an effort to always be connected to the office, a CEO’s mobile device may have unfettered access to company records and sensitive information--more so than an average employee’s personal device.

In the case of an employee that has separate mobile devices for their work and personal life (often a luxury that CEOs can’t enjoy), the risk of data leakage or a breach resulting from the device getting lost or stolen goes down dramatically. Alternatively, CEOs aren’t restricted to the office and this mobility increases the risk of being hacked outside the office, especially when it comes to using their mobile devices in venues that offer public Wi-Fi, like coffee shops, cafés, conference centers, airports, etc. Hackers know this and they go to great lengths to make public Wi-Fi hotspots traps for unsuspecting users. This is why CEOs should be wary about accessing public Wi-Fi, and why it’s preferable that CEOs even avoid public Wi-Fi altogether (unless you are using a secure VPN to access all of your data).

A 2017 security report by iPass confirms this risk of cyber-attacks at popular Wi-Fi hotspots. The report ranks the riskiest public venues as follows.

  • Coffee shops and cafés, 42 percent.
  • Airports, 30 percent.
  • Hotels, 16 percent.
  • Exhibition centers, 7 percent.
  • Airplanes, 4 percent.

How much time do your company’s C-level executives spend doing business from these locations? The more business that’s done using Wi-Fi at these locations, the more of a risk an executive or even a mobile employee is to your organization.

Finally, CEOs are in a category unto themselves when it comes to another risk: CEO whaling scams. This is where scammers spend time researching the lives and motivations of CEOs so they can specifically target them with scams from a variety of sources, including email, phone calls, traditional paper mailings, and whatever other means they can use to get in contact with a CEO. This is an extremely dangerous scam because, unlike traditional scams like spam messages where the same message gets sent to thousands of people (and it’s often easy to recognize that it’s a scam), a CEO whaling correspondence is personalized to play on a CEO’s deepest fears and desires. For the scammers that go after CEOs like this, the effort is worth the time investment, due to the simple fact that CEOs make for such lucrative targets.

So, there you have it. CEOs are one of a company’s biggest security risks. For your business, this means you’ve got to take additional measures to ensure the protection of your C-level executives. Generally speaking, the same security plan and policies that work for the average employee won’t cut it for an executive, which is something you need to take into account when coming up with your company’s security and BYOD policy. Need help protecting your company’s data? Give Computerware a call today at (703) 821-8200.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 23 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Productivity Software Backup Business Computing Hackers Saving Money Hardware Data Business Malware IT Support IT Services Email Hosted Solutions Google Quick Tips Smartphones Efficiency Gadgets Mobile Devices Business Continuity Small Business Mobile Office Disaster Recovery Virtualization Computer Network User Tips Microsoft Office Server Miscellaneous Network Security Windows 10 Upgrade VoIP Social Media Windows Unified Threat Management Mobile Device Management Smartphone Innovation Operating System Remote Computing BYOD Communication WiFi Vendor Management Passwords Ransomware Marketing Mobile Computing Apps Android The Internet of Things History Holiday Managed IT services Facebook Users Remote Monitoring Firewall Apple Collaboration Analytics Data Management IT Consultant Save Money Alert Office Outsourced IT Automation Big data Content Filtering Health Bring Your Own Device Wireless Technology Search Virus Hiring/Firing App Phishing Lithium-ion Battery Hard Drives Windows 8 Managed IT Services Tech Support Best Practice Going Green BDR Spam Phone System Gmail Recovery Help Desk Browser Employer-Employee Relationship Antivirus Printer Productivity Information Technology Budget Internet of Things IBM Outlook Encryption Saving Time Administration Maintenance Save Time Money Running Cable Managed IT Proactive IT Data storage Computers Humor communications SaaS Bandwidth Customer Service Education Intranet Networking Hacking Update Telephone Systems Training Office 365 Data Backup User Digital Payment Securty Solid State Drive It Management IT Support Hard Drive Government PowerPoint Flexibility Social Networking Fax Server Word Risk Management Twitter Legal Password Artificial Intelligence Hacker Avoiding Downtime iPhone Business Intelligence Tablet Hosted Solution Two-factor Authentication Current Events Document Management Wireless Mobile Device Computer Repair Website Travel Black Market Gaming Console Statistics Retail Webcam Experience Business Growth Cloud Computing Hack Telephony Monitors Streaming Media Inbound Marketing YouTube Settings Chrome End of Support Router Safety Public Cloud Computer Accessories Law Enforcement Social Customer Relationship Management Co-managed IT Politics Comparison DDoS Augmented Reality Cybersecurity Network Congestion Lifestyle Cybercrime Text Messaging Mobility Laptop Automobile VPN Cortana Cost Management How To Office Tips Paperless Office Processors Downtime Sports USB Net Neutrality Computing Presentation Taxes Company Culture Uninterrupted Power Supply Pain Points Robot Virtual Desktop IT service Excel User Error Data Recovery Documents Programming Compliance Trending Heating/Cooling Corporate Profile Best Available In Internet of Things Rental Service Deep Learning Keyboard Point of Contact Memory Domains Visible Light Communication Assessment Emails Product Reviews Scalability Best Practives Wi-Fi eWaste Read Thin CLient VoIP Value Shortcut Flash Advertising Consultation Troubleshooting Meetings Microserver Private Cloud Staffing Google Wallet Environment Cabling Competition Leadership Administrator Displays Unified Communications Business Owner Supercomputer Turn Key Worker Machine Learning Trojan Banking Device Management Drones Disaster Application Distributed Denial of Service Organize File Sharing Language Permissions Google Drive Specifications Employer Employee Relationship Licensing online Currency Business Metrics switches Electricity Digital Signature Botnet Writing Entertainment Chromebook Mouse WannaCry Computer Malfunction Messenger Work/Life Balance Cryptocurrency Time Management GPS Analytic Harddrive Download Google Docs Public Speaking IT consulting Motion Sickness Books Ebay Cleaning Touchscreen 3D Tracking External Harddrive CIO Windows 10 Microchip Recycling Entrepreneur Regulations Windows XP Digital HIPAA Web Server Business Managemenet Reading Smart Phones Get More Done Pirating Information Society Websites Electronic Payment Adminstration Workers Start Menu Printer Server Hacks Micrsooft IP Address Access Relocation Content Management Identity Theft Human Resources Software as a Service Samsung G Suite Notifications Spyware Physical Security Skype Reliable Computing Virtual Reality Video Surveillance Music Tablets Saving ZTime Data Protection Teamwork Upselling Sync Webinar LinkedIn Social Engineering Upgrades Bluetooth LiFi cache Storage CCTV Archive Computing Infrastructure Debate PDF Google Maps Capital Productuvuty 3D Printing CrashOverride

hp supplies medallionLarge2017