Providing IT Support Services for PC and Windows devices, Microsoft 365 (formally Office 365), Microsoft Teams, Microsoft 365 Business Voice and Telephone System, Hardware, Servers, Infrastructure, IT Training and free Product Workshops throughout Yorkshire including Wakefield, Leeds, Pontefract and Castleford.
Get in touch today
Address: Unit 3 Flemming Court, Whistler Drive, Castleford, West Yorkshire. WF10 5HW
Tel: 01977 809838
Email: [email protected]
Copyright © Eitex all rights reserved.
Massive security breaches that involve global companies always make the headlines. It’s dramatic news copy that reminds us all to take care and be security-aware online.
But these big, reported breakdowns in cyber security are the tip of the iceberg. There are many more hacks and breaches that never make the daily news headlines. They are still damaging, undermine business confidence and cause untold disruption and expense.
And the most common place for the attack to originate is from within your own organisation:
A 2016 Cyber Security Intelligence Index report revealed that only 40% of all security attacks came from outside the company involved. So 60% came from inside, and 75% of those were malicious.
Most Targeted Industries
Those industries with the biggest data banks of personal information, or those with huge financial assets are most at risk. However, all companies have a security weak spot represented by their employees.
You can’t avoid trusting staff with company data, or refuse to give access to needed sensitive information. Our MD Dean Spencer hears many companies voice this dilemma. He says, “It can seem like ‘catch 22’. You have to trust people, but how can you be sure you’re not opening the door to all kinds of forbidden activities?”
Build Security from the Inside
Focusing your cyber security in the right places strengthens your weak spots. But you have to know where to look:
Building Awareness
Another part of the ‘catch 22’ conundrum comes from the ways in which many companies operate. We don’t employ most staff members for their knowledge about computer security.
They’re employed for the contributions they make to business success, and many are paid depending on productivity. Staff will take shortcuts or completely ignore processes that make their job more difficult. This could involve anything from banned file sharing to complicated login/password routines. IT systems have to stay secure while still allowing people to do their jobs efficiently.
For every company, the issue revolves around how to make information sharing and communication in the workplace quick and easy, while still maintaining good security standards.
We run Office 365 Taster Days to help answer this exact question. We’ll show you how to beef up your internal security and harness the full power of cloud computing at the same time. There is still time to book a spot on the next free Taster Day on 17th January. We’ll help you strengthen your computing security in 2018 and beyond.
About Eitex
Providing Managed IT Support to Small and Medium sized businesses including Microsoft 365 (formally Office 365), Microsoft Teams and Microsoft Azure. All services are backed by our Helpdesk based in West Yorkshire.
Tags