Let us be your IT department!
Call us Today! (703) 821-8200

 

 

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

With Great Power Comes a Greater Security Risk, Study Finds

With Great Power Comes a Greater Security Risk, Study Finds

Every user on your network adds an additional level of risk, whether it be risk of user error, making a mistake that causes a data breach, or worse. One would assume that a company’s biggest risk would come from an untrained employee that disregards security policies, but surprisingly, that’s not always the case. Research has shown that a company’s CEO along with the rest of its C-level executives are the greatest security risk.

There are multiple factors that go into this. Take for instance the sheer amount of sensitive data that a CEO has access to. Whereas an average employee may just have access to data pertaining to their job or their department, a CEO generally has carte blanche to access any data they desire.

Then there’s the fact that CEOs typically have a poor work-life balance. This means that they put in way more hours than the average employee. You don’t have to be an expert in risk assessment to understand that a user accessing a company’s network 60, 70, or even 80 hours each week is a far greater risk than a user that only accesses the network 40 hours per week.

Both of these factors contribute to another reason why CEOs make for such a large security risk: the mobile devices they carry. In an effort to always be connected to the office, a CEO’s mobile device may have unfettered access to company records and sensitive information--more so than an average employee’s personal device.

In the case of an employee that has separate mobile devices for their work and personal life (often a luxury that CEOs can’t enjoy), the risk of data leakage or a breach resulting from the device getting lost or stolen goes down dramatically. Alternatively, CEOs aren’t restricted to the office and this mobility increases the risk of being hacked outside the office, especially when it comes to using their mobile devices in venues that offer public Wi-Fi, like coffee shops, cafés, conference centers, airports, etc. Hackers know this and they go to great lengths to make public Wi-Fi hotspots traps for unsuspecting users. This is why CEOs should be wary about accessing public Wi-Fi, and why it’s preferable that CEOs even avoid public Wi-Fi altogether (unless you are using a secure VPN to access all of your data).

A 2017 security report by iPass confirms this risk of cyber-attacks at popular Wi-Fi hotspots. The report ranks the riskiest public venues as follows.

  • Coffee shops and cafés, 42 percent.
  • Airports, 30 percent.
  • Hotels, 16 percent.
  • Exhibition centers, 7 percent.
  • Airplanes, 4 percent.

How much time do your company’s C-level executives spend doing business from these locations? The more business that’s done using Wi-Fi at these locations, the more of a risk an executive or even a mobile employee is to your organization.

Finally, CEOs are in a category unto themselves when it comes to another risk: CEO whaling scams. This is where scammers spend time researching the lives and motivations of CEOs so they can specifically target them with scams from a variety of sources, including email, phone calls, traditional paper mailings, and whatever other means they can use to get in contact with a CEO. This is an extremely dangerous scam because, unlike traditional scams like spam messages where the same message gets sent to thousands of people (and it’s often easy to recognize that it’s a scam), a CEO whaling correspondence is personalized to play on a CEO’s deepest fears and desires. For the scammers that go after CEOs like this, the effort is worth the time investment, due to the simple fact that CEOs make for such lucrative targets.

So, there you have it. CEOs are one of a company’s biggest security risks. For your business, this means you’ve got to take additional measures to ensure the protection of your C-level executives. Generally speaking, the same security plan and policies that work for the average employee won’t cut it for an executive, which is something you need to take into account when coming up with your company’s security and BYOD policy. Need help protecting your company’s data? Give Computerware a call today at (703) 821-8200.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 27 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Software Productivity Business Computing Backup Hackers Saving Money Hardware Data Business Malware Hosted Solutions IT Services Email IT Support Quick Tips Smartphones Gadgets Google Efficiency Mobile Devices Small Business Mobile Office Disaster Recovery Virtualization Business Continuity Computer Microsoft Office Network Server User Tips Miscellaneous Upgrade Social Media Network Security Windows 10 VoIP Mobile Device Management Unified Threat Management Windows Innovation Smartphone BYOD Operating System Communication WiFi Passwords The Internet of Things Marketing Remote Computing Mobile Computing Apps Ransomware Vendor Management Firewall History Holiday Managed IT services Users Android Analytics Apple Collaboration Facebook Remote Monitoring IT Consultant Save Money Alert Data Management Bring Your Own Device Automation Office Big data Health Content Filtering Going Green Hiring/Firing Wireless Technology App Lithium-ion Battery Windows 8 Hard Drives Tech Support Best Practice BDR Spam Outlook IBM Phishing Virus Outsourced IT Search Gmail Browser Employer-Employee Relationship Phone System Productivity Budget Printer Internet of Things Information Technology Save Time Money Administration Maintenance Saving Time Running Cable Managed IT Services Data storage Proactive IT Help Desk Humor Computers Customer Service Bandwidth Education Telephone Systems Hacking Networking Training Mobile Device Document Management Office 365 Computer Repair User Hard Drive IT Support Managed IT Intranet Government Recovery Solid State Drive Update Flexibility Risk Management Legal Digital Payment Hacker Fax Server communications Tablet PowerPoint Social Networking SaaS Antivirus Two-factor Authentication Hosted Solution Wireless Twitter Avoiding Downtime Artificial Intelligence Travel Website Current Events iPhone Black Market Encryption Business Intelligence Business Growth Monitors Gaming Console Settings Public Cloud YouTube Webcam Statistics Cybersecurity Safety End of Support Social Politics Network Congestion DDoS Law Enforcement Automobile Streaming Media Inbound Marketing Cybercrime How To Word Co-managed IT Chrome Password Laptop Cortana Router Cost Management Computer Accessories Paperless Office Taxes Comparison Downtime Customer Relationship Management Lifestyle Processors Office Tips Uninterrupted Power Supply Computing USB Augmented Reality Presentation Sports Company Culture IT service Virtual Desktop Text Messaging VPN Robot Documents Programming Heating/Cooling Compliance Cloud Computing Pain Points Hack Net Neutrality Retail User Error Experience Excel Troubleshooting Supercomputer Staffing Machine Learning Environment Worker Video Surveillance WannaCry Distributed Denial of Service Competition Advertising LinkedIn Business Owner Trending Saving ZTime Banking Employer Employee Relationship Google Wallet Best Practives Displays File Sharing Licensing Debate Digital Language Botnet Application Unified Communications Archive Specifications Disaster Microserver Business Metrics Drones Point of Contact Access Computer Malfunction Permissions Digital Signature Entertainment Securty Turn Key Thin CLient Chromebook Mobility Trojan Writing switches Messenger Spyware Organize Work/Life Balance Motion Sickness Analytic Leadership Download Tracking Books Windows 10 Device Management Web Server Public Speaking Cryptocurrency Microchip Workers Google Docs Start Menu Regulations Entrepreneur IT consulting Reading Business Managemenet Cleaning online Currency HIPAA Electronic Payment CIO Hacks Samsung Relocation G Suite Windows XP Harddrive Mouse Identity Theft Physical Security IP Address Society Micrsooft External Harddrive Notifications Tablets Human Resources Reliable Computing Data Protection GPS Sync Skype Virtual Reality CCTV Smart Phones Social Engineering Google Maps Get More Done Scalability Corporate Profile Printer Server 3D Bluetooth In Internet of Things Teamwork Ebay Storage Recycling Computing Infrastructure Emails Music Upgrades PDF Rental Service Pirating Information VoIP Adminstration Memory Keyboard LiFi Best Available Product Reviews Wi-Fi Meetings Domains Deep Learning Private Cloud eWaste Read Telephony Cabling Upselling Electricity Webinar Flash Administrator Shortcut Visible Light Communication Content Management Value

hp supplies medallionLarge2017