Common Human Behaviors That Harm Cybersecurity

HUMANS!

Their behaviors are the worst!

Yet many small businesses overlook the human element, which can be the weakest link in their security chain. Here are some common behaviors that can jeopardize cybersecurity.

1. Using Weak Passwords: A staggering 81% of company data breaches are due to poor password practices. Simple passwords can be cracked in seconds, yet many users opt for convenience over complexity.

2. Clicking on Phishing Emails: Phishing attacks have increased by 65% in the last year, targeting unsuspecting employees who click on malicious links. These emails often appear legitimate, tricking users into giving away sensitive information.

3. Ignoring Software Updates: It’s tempting to hit 'remind me later' on updates, but this delays critical security enhancements. An unpatched software can be a goldmine for hackers, with 60% of breaches linked to a vulnerability where a patch was available but not applied.

4. Mismanaging Sensitive Information: Careless information handling can lead to serious breaches, whether leaving sensitive papers on desks or sharing passwords over insecure platforms.

5. Overlooking Employee Training: Human error accounts for 90% of cyber breaches. Regular training can drastically reduce this risk, yet many small businesses cut corners on cybersecurity education.

These behaviors threaten individual security and can have devastating effects on your business. Implementing stringent password policies, educating employees about phishing, keeping software updated, securely managing sensitive information, and investing in regular cybersecurity training can turn your employees from potential liabilities into robust defenses against cyber threats.

Need help? Schedule 15 minutes with us. Fifteen minutes today will save you a month of headaches.

R

Russell Mickler

Russell Mickler is a computer consultant in Vancouver, WA, who helps small businesses use technology better.

https://www.micklerandassociates.com/about
Previous
Previous

Why Treating Your Passwords Like Your Underwear is Good Business Practice

Next
Next

Cybersecurity on the Go: Protecting Your Small Business with Smart Mobile Practices