• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • ITES  /  5 Poor security practices that endanger an IT organization
20 June 2018

5 Poor security practices that endanger an IT organization

Written by Seqrite
Seqrite
Cybersecurity, ITES
  • 4
    Shares
Estimated reading time: 3 minutes

Security is a habit. Like most human habit, it requires years of practice to form. The exception to this is the bad habits. Cybersecurity experts know that bad habits are intrinsically easy to slip into. It’s just easier for employees to turn off their firewall to stop all the incessant alerts. Or put an easy password so that is easy to remember. Even give their data to any website which asks for it.

Once these bad habits are formed, they are difficult to break and could be horrendous for an organization’s security. Ultimately, cybersecurity revolves around human beings. If there is a culture of poor security practices, that organization is looking at a place where they are extremely vulnerable to breaches or any forms of other attack.

Here are five poor security practices which many organizations have been guilty of doing:

1. Not implementing access control policies

Access control is an issue almost every organization struggles with. They may have the strongest firewalls but it can be sometimes of no use if every user in the organization has access to everything. That makes the company very susceptible to insider breaches. That also means, if a hacker manages to gain control of a system with access to the network, it is a bonanza for them.

2. Not employing IPS/IDS systems

Intrusion Detection and Prevention Systems (IDS/IPS) work a little differently from other cybersecurity solutions. These solutions provide monitoring and tracking for analysis. This requires a little effort on the part of network administrators but that is worth it. This data can throw up valuable insights showing detailed activity of intrusions which allow to better frame a security policy.

Read more: Benefits of having Intrusion Prevention/Detection System in your enterprise

3. Not having a security policy

On this topic, it’s essential to have a security policy. It may sound like a no-brainer, but many organizations still haven’t woken up to the fact. A cybersecurity policy is as important a piece of document as any other policy in the organization and needs to be enforced as seriously. The cybersecurity policy must be comprehensive, contain dos-and-don’ts with every employee familiar with it.

4. Not updating the software you use

In 2017, the WannaCry ransomware attack grabbed headlines all around the world. It exploited a security hole in Windows XP. Yes, that’s right – Windows XP, an operating system which is now almost two decades old and which Microsoft itself stopped supporting in 2014. In fact, it was found that 7% of PCs all across the world still use this outdated operating system. This example sums up the extreme danger of not updating the software a business uses. Hackers are more than aware of the lethargy in big businesses and will exploit the same brutally.

5. Not understanding the risk of social engineering

Sometimes, an organization can go completely the other way and believe cybersecurity is a technology issue. It absolutely is not – because, at its foremost, it is a human issue. An organization’s employees can be its biggest asset or liability. Unless they are also taken along the cybersecurity ride, it will be difficult for them to identify breaches, plug loopholes or not get taken in by phishing mails. For this, regular awareness and training is important.

Seqrite’s Unified Threat Management (UTM) provides a one-stop solution for many of the problems identified above. It acts as a first line of defense providing IT security management, a safe working environment, high productivity, regulatory compliance in a cost-effective bundled solution.

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous PostWhat is the mystery about the Deep and Dark Web?
Next Post  Emerging Security Threats in Cloud Computing
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Turn the Page Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Building a holistic cybersecurity strategy to safeguard the pharma sector

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021
  • Data breach volumes worry governments and businesses

    The Data breach inferno burning big-ticket businesses

    February 5, 2021

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.