• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Uncategorized  /  Addressing the weakest link in cyber security: Human Error
15 June 2017

Addressing the weakest link in cyber security: Human Error

Written by Ankita Ashesh
Ankita Ashesh
Uncategorized
Estimated reading time: 3 minutes

To err is human, to forgive is divine, and we all know it too well. But we have also witnessed multiple occasions when the impact of an error can be quite devastating. While we may forgive, but the damage done is certainly high. For organizations, one such scenario could be an error on the part of an employee which may lead to a massive cyber-attack.

Over the years it has been observed that organizations lose revenue, customers and business opportunities due to cyber-crime. It is believed that in 2016 alone, more than one-third of organizations that were victims of a cyber-attack, reported more than 20% of revenue loss. About 22% of affected organizations lost customers, 29% suffered revenue loss and 23% had negative impact on business opportunities. It is projected that the cost of cyber-crime will reach $2.1 Trillion globally by 2019.

When the impact is so dreadful, you definitely look into all possible areas of cyber security and carefully examine all areas where it can be compromised. What comes out as the weakest link in the entire cyber security chain is ‘human error’.

Why human error is the weakest link?

It is claimed that a large number of cyber-crimes are due to some form of human error. This includes phishing, hacking or even malware incidents. Not keeping devices password protected or keeping easily guessable passwords, clicking and opening emails from unknown/ not verified sources, accessing sites over unprotected browsers are some very basic mistakes that your employees might be making. Even their secured credentials may be hacked when they pass on information out of your network say for example, an employee mailing his work to his personal id for completing at home later or sharing sensitive information with third party vendors and partners or sharing passwords with colleagues to access their data or other common systems. At all points, there is scope of information leakage and a big threat to your business. The worst is an irate employee purposefully mishandling your company’s sensitive information and causing major data loss.

The security of your organization is also at stake due to external data thefts like loss of laptops while out of office or an attack through an external storage device which your employee used at a public machine and then on his office laptop.

The big question thus is how to handle human error?

Strengthening the weak link

While organizations are largely investing into cyber security tools and hiring specially skilled people to make sure their data is safe; it is important to educate their employees at the core to reduce vulnerability. A few things that organizations need to do include:

  1. Educate and train people

Employees should regularly undergo security training which should touch upon latest trends in cyber-crime so that they are abreast with latest threats. They should be educated enough on what types of mails and activities they should be wary of and what to do in case they accidentally do click on some fraudulent /damaging links. If possible, employees should be put in simulated environments like a phishing attack to give them a more realistic and hands on experience.

  1. Be prepared to minimize impact and damage

Ensuring multi layered protection with latest software is a basic that all organizations should follow. Special attention needs to be given to access rights and permissions to employees at different levels. Having more stringent password creation policies, better managed email servers, limiting external portable device usage and blocking certain website access from official devices are some other ways to improve cyber security. With these in place, not only do you reduce the chances of a cyber-attack but also ensure least damages in case of a cyber-crime.

 3. Back up your data – At all times!

Maintaining regular, timely and proper backups is the only way to ensure least damage in case of cyber-attacks. While it is advised to have best security software and practices in place, your systems are still vulnerable to threats and the only way to control or minimize the damage is by ensuring proper backups for your systems. It would be even better to have backups at multiple locations like cloud, external hard drive or even a thumb drive. Having latest updated software along with regular backup scheduling can work well in preventing attacks as well as reducing the intensity of damage.

Seqrite helps businesses simplify IT security and maximize business performance. To know more about our products and services visit our website. 

 Previous Post5 Cyber Attacks that Shook the World
Next Post  Need for Security Expert at Senior Level: CISO
Ankita Ashesh
About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • Gorgon APT fractures India’s Industrial Backbone

    Gorgon APT targeting MSME sector in India

    August 10, 2020
  • Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

    May 21, 2020
  • The-need-for-businesses-to-empower-the-CISO

    Why do boards need to empower their CISO?

    October 22, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.