{"id":138,"date":"2020-01-06T13:13:04","date_gmt":"2020-01-06T13:13:04","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=138"},"modified":"2021-09-10T06:52:14","modified_gmt":"2021-09-10T06:52:14","slug":"5-data-security-risks","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/","title":{"rendered":"5 Data Security Risks"},"content":{"rendered":"<p><b>5 Data Security Risks<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-60\" src=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Data-Security-Risks.png\" alt=\"\" width=\"800\" height=\"2000\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><b>1. No data security policies &#8211; and poor enforcement<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A small business needs to reflect upon its own policies to see whether data security is imbibed into their work culture. Without a security policy, most businesses end up vulnerable to attacks and most of them fail to contain breaches due to non-existent post-breach policies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SMBs should ensure data protection policies are put in place, communicated to employees, insiders and customers, and strictly implemented. In fact, 80% of organizations, regardless of size, believe managing and monitoring end-user privileges and entitlements is the most important security measure against data breaches.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>2. No one\u2019s monitoring systems for potential breaches<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A bit of bad code is going to do its best to mind its own business while stealing from your business, and could go on for months, compromising passwords, copying documents and even stealing identities. You need software that frequently searches your systems for attack vectors, updates protections, and administers patches where needed. One best practice is to subscribe to a managed IT security service from a trusted partner.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>3. No employee training<\/b><br \/>\n<span style=\"font-weight: 400;\">A company\u2019s greatest asset\u2014its employees\u2014can also be its weakest link, especially in an era wherein mobility and accessibility play a huge role in enhancing productivity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whether purposefully or unintentionally, your employees can wreak havoc on your company\u2019s data, networks and programs. The companies that understand this are establishing additional layers of ground level security and training employees in the basics of digital security. Employees need to know what actions open the company up to risk, and which actions are preferred. If you have a BYOD policy in place, there should also be some intentional conversation about what information can be accessed on devices.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>4. Employee mobility may prove disastrous<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Mobile devices enable the workforce to access data from virtually anywhere at any time, allowing greater flexibility and productivity. Freedom, however, may come at a price. Research shows that 56% of employees very frequently or frequently stored sensitive data on their laptops, smartphones, tablets, and other mobile devices. This means there is more than a 50% chance that confidential information can land in the wrong hands should they lose these devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employees\u2019 personal devices are unlikely to have the same level of security as corporate devices, and may be significantly easier for hackers to compromise. Companies that allow BYOD should ensure they have a strict BYOD policy in place that they ensure all employees follow. Steps such as only allowing access to company networks through a virtual private network (VPN), and ensuring employees implement 2FA on all their accounts are definite steps that should be included in such a policy.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b><br \/>\n<\/b><b>5. Lack of authentication<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Require employees to use unique passwords and change passwords every three months. Consider implementing multi-factor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data, especially financial institutions, to see if they offer multi-factor authentication for your account.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">In an era where data is money and cybercrime is a real threat, small businesses need to understand that the cost of data breaches is higher than the cost of implementing security systems.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">After all, small businesses are large corporations in their nascent stage. Any breach at such a stage may prove to be detrimental to the future of the entire business. Mending the above-mentioned loopholes and devising secure measures for protecting your business will prove to be efficient in protecting yourself against security threats. A little precaution and smart work can help you protect millions. Keeping a vigilant eye on the events in your surroundings will definitely help you stay in business and rise to the top.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Want to Know More?<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Want to know one of the best ways to protect your VDI?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Download a 30 day trial of RecordTS and begin recording and protecting your servers today.<\/span><\/p>\n<p><span style=\"color: #993300;\"><a style=\"color: #993300;\" href=\"https:\/\/www.tsfactory.com\/\"><span style=\"font-weight: 400;\">https:\/\/www.tsfactory.com\/<\/span><\/a><\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Sources<\/span><\/i><\/p>\n<p><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.itgovernance.co.uk\/blog\/the-5-biggest-information-security-concerns-facing-organisations\/\"><span style=\"font-weight: 400;\">https:\/\/www.itgovernance.co.uk\/blog\/the-5-biggest-information-security-concerns-facing-organisations\/<\/span><\/a><\/span><\/p>\n<p><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/spideroak.com\/articles\/5-data-security-risks-small-businesses-cant-ignore\/\"><span style=\"font-weight: 400;\">https:\/\/spideroak.com\/articles\/5-data-security-risks-small-businesses-cant-ignore\/<\/span><\/a><\/span><\/p>\n<p><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/about-threats.trendmicro.com\/resources\/assets\/primers\/five-data-security-risks-smb-should-know.pdf\"><span style=\"font-weight: 400;\">http:\/\/about-threats.trendmicro.com\/resources\/assets\/primers\/five-data-security-risks-smb-should-know.pdf<\/span><\/a><\/span><\/p>\n<p><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.cybintsolutions.com\/5-of-the-biggest-cyber-security-risks-for-businesses\/\"><span style=\"font-weight: 400;\">https:\/\/www.cybintsolutions.com\/5-of-the-biggest-cyber-security-risks-for-businesses\/<\/span><\/a><\/span><\/p>\n<p><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.shredit.com\/en-us\/blog\/securing-your-information\/september-2017\/5-data-security-risks-small-businesses-need-to-tac\"><span style=\"font-weight: 400;\">https:\/\/www.shredit.com\/en-us\/blog\/securing-your-information\/september-2017\/5-data-security-risks-small-businesses-need-to-tac<\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>5 Data Security Risks &nbsp; &nbsp; 1. No data security policies &#8211; and poor enforcement A small business needs to reflect upon its own policies to see whether data security is imbibed into their work culture. Without a security policy, most businesses end up vulnerable to attacks and most of them fail to contain breaches [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":60,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[20],"class_list":["post-138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest","tag-data-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Data Security Risks - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Data Security Risks - Blogs\" \/>\n<meta property=\"og:description\" content=\"5 Data Security Risks &nbsp; &nbsp; 1. No data security policies &#8211; and poor enforcement A small business needs to reflect upon its own policies to see whether data security is imbibed into their work culture. Without a security policy, most businesses end up vulnerable to attacks and most of them fail to contain breaches [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-06T13:13:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-10T06:52:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Data-Security-Risks-e1631256726215.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/\",\"name\":\"5 Data Security Risks - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Data-Security-Risks-e1631256726215.png\",\"datePublished\":\"2020-01-06T13:13:04+00:00\",\"dateModified\":\"2021-09-10T06:52:14+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Data-Security-Risks-e1631256726215.png\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Data-Security-Risks-e1631256726215.png\",\"width\":600,\"height\":1500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Data Security Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Data Security Risks - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/","og_locale":"en_US","og_type":"article","og_title":"5 Data Security Risks - Blogs","og_description":"5 Data Security Risks &nbsp; &nbsp; 1. No data security policies &#8211; and poor enforcement A small business needs to reflect upon its own policies to see whether data security is imbibed into their work culture. Without a security policy, most businesses end up vulnerable to attacks and most of them fail to contain breaches [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2020-01-06T13:13:04+00:00","article_modified_time":"2021-09-10T06:52:14+00:00","og_image":[{"width":600,"height":1500,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Data-Security-Risks-e1631256726215.png","type":"image\/png"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/","name":"5 Data Security Risks - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Data-Security-Risks-e1631256726215.png","datePublished":"2020-01-06T13:13:04+00:00","dateModified":"2021-09-10T06:52:14+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Data-Security-Risks-e1631256726215.png","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Data-Security-Risks-e1631256726215.png","width":600,"height":1500},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-data-security-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"5 Data Security Risks"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=138"}],"version-history":[{"count":2,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/138\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/138\/revisions\/257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/60"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}