Fixing Your Weakest Security Link: Your Employees

You can have every piece of security hardware in the books: firewall, backup and disaster recovery, and even anti-virus. However, your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks.

How do you mitigate as much risk as possible?

 

CREATE AND STRICTLY ENFORCE A PASSWORD POLICY

Passwords should be complex, randomly generated, and replaced regularly. In order to test the strength of your password go to howsecureismypassword.com. (This is a perfectly safe service sponsored by a password protection platform that tells you how long it would take a hacker to decode your password.)

When creating a password policy, bear in mind that the most prevalent attacks are dictionary attacks. Most people utilize real words for their passwords. Hackers will typically try all words before trying a brute force attack.

Instead of words, use a combination of letters, numbers, and symbols. The longer the password, the stronger it is.

While it’s difficult to remember passwords across different platforms, try not to repeat passwords. This will protect all other accounts in the event of a breach on one of your accounts.

 

TRAIN AND TEST YOUR EMPLOYEES REGULARLY

Educate your employees on how they can spot a phishing attack. Then, utilize penetration testing (this is a safe phishing attack orchestrated by your IT company to see how employees respond) and how well they do.

If employees fall for phishing attempts then send them through training again. We recommend doing this on a quarterly basis to ensure that your employees stay on their toes and you should provide education on the latest attacks.

 

CREATE A BRING YOUR OWN DEVICE POLICY AND PROTECT ALL MOBILE PHONES

You can safeguard as much as humanly possible on your network, but your employees are all walking in with cell phones. Are they allowed to get work emails on their phones? What about gaining access to the network remotely?

Cell phones create a big black hole in security without proper mobile device management and mobile security.

 

PERFORM SOFTWARE UPDATES REGULARLY

Make sure that your software is up-to-date with all the latest security patches. Holding off on updates means that you’re leaving yourself open to vulnerabilities that have been discovered and addressed.

 

INVEST IN SECURITY

Security is not something for cost savings. Home-based hardware is not sufficient, and you, at the very least need a quality firewall and backup device. Invest in your employee’s training, ongoing security updates, and maintaining a full crisis/breach plan.

 

There are two things that aren’t going away in any business: employees and security threats. Make sure that you’ve taken care of everything you can to avoid falling victim to these attacks.

Security Posters

Take charge of 2025

IT is no longer a back-office function—it’s a driver of growth and innovation. By tackling this checklist, you can ensure your business is ready to thrive in the face of challenges and opportunities alike.

Ready to transform your IT strategy? Schedule a free consultation with Techvera today.

Techvera icon

Written by Team Techvera

l

October 11, 2019

You May Also Like…

IT Checklist: What Small Businesses Need To Prioritize in 2025

IT Checklist: What Small Businesses Need To Prioritize in 2025

Now is the perfect time to revisit your IT structure, processes, and strategy to ensure your small business operates at its fullest potential. From defending against evolving cyber threats to supporting hybrid teams and boosting productivity, a robust IT strategy is essential to staying ahead in today’s competitive market.

Here’s a refreshed IT checklist to set your business up for success in the year ahead.

Skip to content