Can you spot 4 security flaws with this employee’s desk?

Cybersecurity incidents continue to be a major threat. Cybercriminals often rely on human error – like failing to install software patches, clicking on malicious links and creating easy-to-guess passwords – to gain access to systems and information. Every employee – from senior leadership to the newest employee – is responsible for keeping their organization’s information and systems secure. That’s why it’s important to educate employees on strong cybersecurity.

Cybersecurity isn’t just the job of the IT department. Check out this employee’s desk. Can you guess the security flaws?

  1. Unlocked computer/cell phone– When you leave your computer or phone unlocked, anyone walking past your office can gain access to your information. This means there could be potential modification, removal or sharing of your data. Its critical to use password protection and to always lock your screen when not in use.
    • To set up a computer password, follow these steps
      1. Open your control Panel
      2. Open “User Accounts”
      3. Manage another account
      4. Click on your account
      5. Create a password
  1. Usernames/Passwords out in the open– Never leave passwords out in the open and visible to anyone to see. If someone were to see these passwords, they can easily log into your network and gain access to confidential information. We recommend keeping passwords hidden and in a secure place.

Here are some popular places where many people store their passwords that make them very vulnerable to being stolen.

  • Passwords written on paper (that are not under lock and key):
  • On your desk under your keyboard
  • Taped to the underside of your keyboard
  • On post-it notes stuck to your monitor or desk
  • On a piece of paper on your desk or in a drawer
  • In a loose-leaf or spiral-bound notebook
  • Paper printouts or photocopies of your passwords
  1. Wallet on desk– Leaving your wallet on your desk which could contain not only personal credit cards, but also company credit cards, cards to get into your building, etc. This allows passersby to enter your office and potentially steal that information.
  1. Device left out containing sensitive information– It’s likely that employees use their work computer, cell phone, or USB to access confidential company information. These devices contain sensitive personal and business information that could be harmful if taken.

    I'm interested in...

    Related News