{"id":5319,"date":"2021-03-01T10:52:12","date_gmt":"2021-03-01T07:52:12","guid":{"rendered":"https:\/\/tmc.ke\/staging\/?p=5319"},"modified":"2021-03-01T10:52:15","modified_gmt":"2021-03-01T07:52:15","slug":"cyber-security-in-the-workplace","status":"publish","type":"post","link":"https:\/\/tmc.ke\/staging\/cyber-security-in-the-workplace\/","title":{"rendered":"CYBER SECURITY IN THE WORKPLACE"},"content":{"rendered":"\n<p>The\nexpansion of globalisation has increased the world\u2019s reliance on technology, now\nmore than ever before. Since the development of the internet, there has been a\nmassive surge in digital data creation. Many companies and governments store a\ngreat deal of their data on computers and transmit it across networks to other\ncomputers. It is no secret that technology and its underlying systems have\nvulnerabilities that can be exploited subsequently undermining the proper\nfunctioning of an organisation. <\/p>\n\n\n\n<p>A\nbreach in an organisation\u2019s data stores can have a range of devastating\nconsequences for any business. It can quite literally destroy a company\u2019s\nreputation through the loss of consumer and partner trust. The loss of critical\ndata, such as source files or even intellectual property, can cost a company\nits competitive advantage. In addition, a breach in a company\u2019s data can impact\ncorporate revenues due to non-compliance with data protection laws. <\/p>\n\n\n\n<p>Cybersecurity\nis the combination of processes, practices, and technologies designed to\nprotect networks, computers, programs, data and information from attack, damage\nor unauthorized access. In this article, we\u2019ll look at some of the main cyber\nsecurity issues workplaces face and some tips on how to secure your workplace\ndata. <\/p>\n\n\n\n<ol><li><strong>PHISHING<\/strong><\/li><\/ol>\n\n\n\n<p>Phishing\nis a cybercrime that involves fraudulent attempts to obtain a person\u2019s sensitive\ninformation such as usernames, passwords, bank\/ credit card information etc.\nUsually, victims of phishing are contacted by email, telephone or even text\nmessage by someone posing as a representative of a legitimate institution to\nlure individuals into providing their sensitive data. <\/p>\n\n\n\n<ol start=\"2\"><li><strong>BRING YOUR OWN DEVICE POLICIES <\/strong><\/li><\/ol>\n\n\n\n<p>Some\ncompanies have \u2018bring your own device policies\u2019 (BYOD) in a bid to increase\nflexibility and to cut down on device costs. Employees are therefore allowed to\nbring their own devices such as laptops. The down side to this is that it is increasingly\ndifficult to manage these devices. This then increases the risk of viruses,\nmalware and data breaches. <\/p>\n\n\n\n<ol start=\"3\"><li><strong>DATA AND PRIVACY BREACHES <\/strong><\/li><\/ol>\n\n\n\n<p>Attacks\non personal data have become a growing concern in the past few years. Companies\nthat store personal data about their employees therefore, are at risk of being\ntargeted by those who would like to get a hold of this information with\nmalicious intent. <\/p>\n\n\n\n<ol start=\"4\"><li><strong>RANSOMWARE ATTACKS<\/strong><\/li><\/ol>\n\n\n\n<p>Ransomware\nis a type of malware attack in which cybercriminals gain access to sensitive\ndata and encrypts the victim\u2019s. This prevents the victim from\naccessing their system or personal files. The hackers then demand payment in\norder for the victim to regain access to their data. <\/p>\n\n\n\n<ol start=\"5\"><li><strong>HUMAN ERROR AND NEGLIGENCE<\/strong><\/li><\/ol>\n\n\n\n<p>Even\nif a company is well protected against outside attacks, human error and\nnegligence is sometimes inevitable. This is also the main cause of all data\nbreaches. Be it through a malicious act from a disgruntled employee or simple\ncarelessness, employees are usually the weakest link when it comes to a company\u2019s\ncyber security deference. <\/p>\n\n\n\n<p>In\norder to ensure that your workplace is well protected from cyber criminals, begin\nby having regular meetings with your employees on the importance of\ncybersecurity and observing the proper workplace etiquette on internet use and\ninformation sharing. Train your employees on the various risks and improve\ntheir working habits.<\/p>\n\n\n\n<p>Carry\nout formal risk assessment tests to determine the best cyber protection tools\nfor your workplace. Hire ethical hackers to find weak links in your company\u2019s\ndata protection systems and provide solutions. <\/p>\n\n\n\n<p><a href=\"https:\/\/digitalguardian.com\/blog\/what-cyber-security\">https:\/\/digitalguardian.com\/blog\/what-cyber-security<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-university-of-san-diego\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"2wWnewztk7\"><a href=\"https:\/\/onlinedegrees.sandiego.edu\/top-cyber-security-threats\/\">Top Cybersecurity Threats in 2023<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Top Cybersecurity Threats in 2023&#8221; &#8212; University of San Diego Online Degrees\" src=\"https:\/\/onlinedegrees.sandiego.edu\/top-cyber-security-threats\/embed\/#?secret=YVirwY4Huu#?secret=2wWnewztk7\" data-secret=\"2wWnewztk7\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-network-telecom\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.networktelecom.co.uk\/news\/byod-in-the-workplace-pros-and-cons\/\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-entrepreneur-amp-business-website-talk-business-small-medium-business-advice-tips-sme-success\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"QPGN6NkiI4\"><a href=\"https:\/\/www.talk-business.co.uk\/2017\/12\/29\/how-to-protect-your-workplace-from-cyber-crime\/\">How to protect your workplace from cyber-crime<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to protect your workplace from cyber-crime&#8221; &#8212; Entrepreneur &amp; Business Website | Talk Business | Small, Medium Business Advice, Tips | SME | Success\" src=\"https:\/\/www.talk-business.co.uk\/2017\/12\/29\/how-to-protect-your-workplace-from-cyber-crime\/embed\/#?secret=FNt6koncZp#?secret=QPGN6NkiI4\" data-secret=\"QPGN6NkiI4\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The expansion of globalisation has increased the world\u2019s reliance on technology, now more than ever before. Since the development of the internet, there has been a massive surge in digital data creation. Many companies and governments store a great deal of their data on computers and transmit it across networks to other computers. It is no secret that technology and its underlying systems have vulnerabilities that can be exploited subsequently undermining the proper functioning of an organisation. A breach in an organisation\u2019s data stores can have a range of devastating consequences for any business. It can quite literally destroy a\u2026<\/p>\n","protected":false},"author":4,"featured_media":5320,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[1],"tags":[],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"_links":{"self":[{"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/posts\/5319"}],"collection":[{"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/comments?post=5319"}],"version-history":[{"count":1,"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/posts\/5319\/revisions"}],"predecessor-version":[{"id":5321,"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/posts\/5319\/revisions\/5321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/media\/5320"}],"wp:attachment":[{"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/media?parent=5319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/categories?post=5319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tmc.ke\/staging\/wp-json\/wp\/v2\/tags?post=5319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}