Hackers and other threats may have access to your business computers when employees leave the digital door open. This might even invite intruders into your office.
Do you know what your employees are doing on workplace connections to the Internet? Do your IT authorities recognize potential threats and build protections against these threats?
Monitor What Your Employees Are Doing on Company PCs
Many people love social media sites. There are lots of social media sites for your staff to visit during slow times during the work day.
Some even create social media accounts on your company computers. This is like handing the office keys to a kid and saying “go for it.”
Tell your employees that social media is not part of their job description and to avoid logging in to any social media website.
Cyber-bullying is a growing problem. It’s easy for employees to bully co-workers using your workplace computers. A manager who threatens an employee with punishment, employs name-calling, publishes malicious statements, or uses intimidation by office email is not acting appropriately in the workplace.
Your employee manual must clearly explain the company’s no tolerance position on cyber-bullying. It just shouldn’t happen in the workplace, but it does.
Shopping online is a breeze, especially when you do it during the work day – when you should be working. Online transactions are vulnerable to hackers. They’re also attractive targets for sophisticated hackers looking for names, addresses, Social Security numbers, account numbers, passwords – everything the bad guys need to create a fictitious “you” online.
Once again, your office address is the address of record as hackers swap and sell your access codes to the highest bidder. Think back on the retailers and service providers that have been hacked in the past few years – and they have top-tier IT professionals.
Avoid Online Games as Much as Possible
Clash of Clans may be addictive, but when employees download the game, they download cookies that provide easy access to your digital business information and may put records in the hands of hackers.
Avoid Creating Social Media Accounts on Company PCs
It’s easy to create a password-protected account that even the business owner can’t access. Your staff may create personal accounts on business computers for online gambling websites, porn sites, and websites they don’t want showing up on their home devices.
Some employees create secret email accounts so certain messages are never seen on the home computer. A separate email account may compromise much of the digital security you’ve put in place, simply by connecting to a hacker who now has an email address stored on your office computer. All it takes is one secret email account and a downloaded virus to convert critical company data into digital gibberish.
Never Ignore Online Threats
You and your staff may not recognize a threat. Those who do may feel they’ve solved the problem by deleting the file, but the file is still on the hard drive waiting to launch an attack on your company server.
Steps To Make Your Office Desktops Safe:
- Train your staff in the basics of Internet safety. Make them aware that they should never open an email or an email attachment from an unknown sender.
- Create company policies, in writing and reviewed by legal counsel, describing acceptable and unacceptable use of business computers.
- Subscribe to employee monitoring software such as Veriato 360. This software logs every keystroke of every employee every day, so you know where employees go. Be honest with employees and tell them about the software and why it’s been installed. This will help solve many of the problems listed above.
- Maximize the use of spam filters on your office desktops.