fbpx
  • Stamholmen 173 2650 Hvidovre, DK
  • +45 26 80 46 42
  • hello@eywa.dk

Inadequate Employee Training

 
 

The most serious cybersecurity threat to organisations comes from within. Employee errors, whether intentional or unintentional, are responsible for 88% of data breach occurrences. Data breaches caused by employee error can be attributed to organisations’ lack of security training. Phishing emails, for example, have become a common method of cyberattack in 2022 and are the most common cyber security hazard that employees fall for. What’s the reason? Many phishing schemes use malicious attachments or impersonate well-known individuals or companies to be sent via email.

 

Employees who have received insufficient training on how to detect and avoid phishing schemes are unlikely to act in a protective manner. As a result, there are cybersecurity breaches and significant damage.

 

With more advanced attacks and threats on the rise, many employees lack the knowledge to spot a phishing email. Companies must develop cybersecurity risk management plans and hold learning sessions to educate employees on the prevalence of cyberattacks, how to detect them, and the best course of action.

 

Any cyber security strategy must account for human flaws and take steps to ensure that everyone follows proper procedures. Only employee training, in conjunction with a solid control framework, can provide proper security against cyber security threats.

Misuse of the Internet of Things (IoT)

 
 

The Internet of Things (IoT) refers to how millions of devices from all over the world connect to the internet. This creates a network of interconnected devices capable of storing, transmitting, and receiving data. Because of its convenience, this developing technology is being used by many people and organisations. What is convenient for you, however, is also convenient for cyber attackers. When used incorrectly, the interconnectedness provided by IoT allows hackers easier access to your information.

 

Any hardware device that is linked to a network will inevitably have vulnerabilities. When managing risks, keep an eye on your devices and apply security updates whenever possible. Furthermore, weak passwords contribute to IoT hacks because they are simple to crack. Create strong passwords to protect your IoT device.