1 (306) 502-1116

Data Security: Getting Your Team on Board 

Tillman Hodgson

Data security is everyone’s responsibility in the workplace. Commitment to keeping your information safe can’t be handed off to your IT Team. While they may be responsible for alerting management and initiating a cohesive response to a cyberattack, the bulldog guarding the front door is every member of your organization using the company’s computers and mobile devices to conduct business.

Data security is everyone’s responsibility in the workplace. Commitment to keeping your information safe can’t be handed off to your IT Team. While they may be responsible for alerting management and initiating a cohesive response to a cyberattack, the bulldog guarding the front door is every member of your organization using the company’s computers and mobile devices to conduct business.

According to World Economic Forum research, human error accounted for 95 percent of cybersecurity issues in 2022. Today’s phishing emails are increasingly sophisticated, and they require a keen and suspicious eye to identify and block them. A staff member, overwhelmed or tired on the job, can miss the cues and allow a hacker access to your system.

Effective security awareness training and phishing simulation exercises can make a world of difference in educating your team to work safely online and protect your data and intellectual property.

A phishing simulation exercise that takes your team through plausible scenarios directly related to the way you conduct business can highlight any weaknesses in your security plan or in the knowledge of your team members. Some of the well-known companies that provide services of this nature include KnowBe4 and TerraNova. There are also some “bespoke” companies, such as our partner Teos Consulting, that will use social engineering and inside knowledge to tailor the phishing simulation to your business and your people, creating the most realistic simulated attack possible (called “spear phishing”). These tests give you a way to measure the effectiveness of your security awareness training and to find out what topics to focus your future training on.

Having a cohesive cybersecurity plan and systems in place is vital. However, it’s just as important to engage all employees to protect your business from cyberattacks — and when, how, and who to inform if they detect a suspicious event. Regular trainings and updates will keep everyone on track, and help you to focus on building your brand as a reliable and safe offering to your customer base.

Acting on the suggestions from your test results, and conducting regular checks of your system, using vulnerability scanning, as well as yearly audits of your security program can help you and your team detect issues within your safety net before they cause harm, as well as keeping you abreast of any new threats to your system.

While human error is difficult to eliminate, security training, audits, and follow-up with your team can go a long way to preventing serious issues, and maintain the security and reputation of your organization.

Disclaimer

While we have made every effort to present accurate, unbiased and helpful information in this article, please note that it reflects the author’s opinion and is written for the purposes of general knowledge, information and discussion. This article is not intended as legal advice, nor should it be considered as advice specific to your individual data security situation. If you would like to discuss your cybersecurity needs in specific detail, please get in touch with us

Ready to learn more?

Third Party Security: Who’s Minding Their Store?

Third Party Security: Who’s Minding Their Store?

Giant Tiger made the news this month with a security breach related to a third party. The discount retailer used another company to manage customer engagement and communications. Customer data, including contact information and home addresses were compromised, leaving Giant Tiger with the task of contacting customers to warn them of phishing emails and phone calls likely to ensue as a result.

read more
Stopping the Leaks: How to Play Safe on Today’s Internet

Stopping the Leaks: How to Play Safe on Today’s Internet

Sara finds an email in her inbox, notifying her that she has been the victim of a data leak through one of her social media accounts. Brad gets a similar email, letting him know that his private information is no longer secure after his favourite online store experienced a security breach. These types of notifications are almost commonplace as cybercriminals become increasingly sophisticated in their attacks on the networks that hold our data. In fact, there have been over 26 billion records exposed in what Canadian cybersecurity researchers are terming a “supermassive leak”. 

read more