Protecting Your Tech From Human Sabotage

Don't let human error sabotage your technology.
  • ---Shares
This story appears in the June 2006 issue of Entrepreneur. Subscribe »
Free Webinar | August 16th

Find out how to optimize your website to give your customers experiences that will have the biggest ROI for your business. Register Now »

All the firewalls, anti-virus software and spam killers in the world won't save you from poor user behavior. A recent survey of IT managers by security company GreenBorder showed that most of the malicious code they have to clean from computers resulted from mobile users bringing back "souvenirs" or from user behavior, such as downloading bad software.

There are ways to help protect your business from human error. "It's a two-pronged approach: education, and protecting [employees] from themselves. You need to educate [employees] about clicking on e-mail attachments and downloading software, [and] you need to have the appropriate security software on their computers," says Laura Yecies, general manager of Check Point Software Technologies' recently acquired Zone Labs division, a consumer and SMB network security provider.

A security suite should be installed on every laptop your mobile workers use. Employees should be instructed in proper user behavior. Points to mention include not using work e-mail for personal use, not installing peer-to-peer networking software or any other un-authorized programs, and not plugging gadgets like PDAs into work computers. Software is available that allows you to place usage restrictions on your server or block certain sites from employee access at work. A comprehensive technology and internet security policy is a good start, but also be sure to update the policy and keep employees trained and informed.

Edition: July 2017

Get the Magazine

Limited-Time Offer: 1 Year Print + Digital Edition and 2 Gifts only $9.99
Subscribe Now
OK

This website uses cookies to allow us to see how our website and related online services are being used. By continuing to use this website, you consent to our cookie collection. More information about how we collect cookies is found here.