Skip to main content

3 ways employees pose a security threat for the corporation

Human errors performed by employees pose a real security threat to the corporation they work in. Here are 3 common ways employees pose a threat – and what you as an employee must be aware of.

Doing business in Norway

Today, more and more people do job-related tasks on their phones and work outside of the office. What are the potential risks of doing this? And what other security threats do employees pose for the corporation? 

The European Union Agency for Cybersecurity (ENISA) lists the top 5 cyber threats and trends against European corporations:

  1. Malware
  2. Web-based attacks
  3. Web application attacks
  4. Phishing
  5. Distributed Denial of Service (DDoS)

Visit our Security Centre

The protection from many of these attack vectors relies on the knowledge of a company’s security team to establish the necessary mitigation actions, such as company-wide web-filters and patching web browsers. 

However, human errors performed by employees also pose a real threat to corporations – especially larger ones. What if someone is working on the move and doesn’t use an encrypted connection? And did you know that mobile phones are a great target for phishing

Here are a couple of things that you as an employee must be careful of:

3 ways employees pose a security threat – and what you as an employee must be aware of

1) Getting exposed to “spoofing”

You must also keep in mind that the sender of an email is not always who he or she claims to be.  Spoofing is when a user falsifies information, for example, the geolocation or the name in an email to fool the victim into believing the user is somebody else.

Read more: 7 things you need to know about cyber hygiene.

2) “Piggybacking” is a big security issue

Most workplaces employ access cards together with passcodes to restrict access inside buildings. Yet in larger workplaces, where too many people work for everyone to know one another, it is commonplace that people hold up the doors for strangers to let them pass. 

This phenomenon, known as piggybacking or tailgating, is a big security issue. Dare to say “I’m sorry, I can’t let you in”! Don’t hold the door if you are not sure who it is.

Also read: IT-security: – Many businesses forget the most important thing

3) Juice jacking your items in public means an attacker can transmit data from your laptop

Have you ever been to an airport and charged your phone through a USB socket? Or in a café? With the new USB-C chargers, you can even charge your laptop via USB. However, using what’s known as “Juice Jacking”, an attacker can transmit data from your laptop via the USB cord without your knowledge. For iPhone and Android, however, current software versions should keep you protected.

Read more about security & business on our blog

Most popular

  • ""

    What is an IT Security Policy?

    Every organisation—from startups to large, global corporations and nonprofits—must make sure that they have procedures to keep up with an ever-changing landscape of threats and vulnerabilities to keep its assets secure. But what is an IT Security Policy, and how do you enforce them?

  • ""

    Turning the UEFA Euro into math

    The Finnish company Weoptit, a company in Visma, has turned the UEFA Euro tournament into math and simulations. Based on a model originally built by their analysts prior to the World Cup 2006, they have played out the tournament 1,000 000 times to find out what results each team can expect from this summer’s football festival.