Help prevent user-error security breaches

www.office.com/setup According to the Association of Corporate Advisors, the involuntary error of employees is the main cause of data breaches. And with 87 percent of IT professionals concerned about the security of cloud data, according to a Dimensional survey conducted for Druva, it’s easy to feel vulnerable. The prevention of these unintentional errors can help keep your data protected.

The problem: simple passwords

Simple or reused passwords open the door to hackers. According to Splash Data, the five worst passwords of 2015 were:

123456
password
12345678
QWERTY
12345
But even a large password can pose problems when used in several places. Hackers know that people like to reuse passwords, so when they decrypt one, they test it on multiple sites, especially those that may contain information of higher value.

Your solution: educate employees on how to create a secure password. Then, implement a policy to ensure that passwords meet the minimum complexity requirements and require users to change them often. Also, encourage safe password-keeping practices, such as the use of third-party services that store passwords in the cloud and secure them all with a master password.

The problem: falling into phishing

According to a Verizon Data Breach report, phishing is the second most common threat and is implicated in about a quarter of all data breaches. If a phishing message ends up in an employee’s inbox, it is very likely that they click on the link.

Your solution: In addition to first-level security and secure email filters, encourage users to report suspicious-looking messages, similar to sending junk mail. Once reviewed and identified as a threat, add these messages to the filters of the entire service.

help-prevent-user-error-security-breaches-1

In Exchange Online, Email Security Tips provide an additional layer of protection with a warning to the user in messages marked as suspicious.

The problem: BYOD practices
The policies of bringing your own device (BYOD) are widely used in the current business landscape, but employees who access confidential information from personal devices can open the door to security threats. According to research by the Ponemon Institute, a total of 67 percent of respondents cited employees who use their devices to access company data as the probable cause or cause of data breaches.

Your solution: Create clear BYOD policies and educate employees on how to follow these guidelines, including what is at risk if ignored. For additional layers of security, the use of approved secure mobile applications and multi-factor authentication is required when accessing company information.

Lost or stolen devices
Lost devices are another major cause of data breaches. And not only the devices owned by employees, even your company’s devices are at risk, leaving your organization exposed to threats if they are lost or stolen.

Your solution: Educate employees on the proper security of the device inside and outside the establishment, and instruct them to report lost devices as soon as possible. Enable security policies to ensure that you can remotely access, locate and delete a device if necessary.

Keep your business and email safe
Help protect your organization’s data with the security features of the email you need to advance your business. Office 365 has built-in security and compliance features, always up-to-date, for greater peace of mind.

Get the free eBook

Educate employees continuously to minimize the risk of common violations of user errors. The security features available with Office 365 help mitigate employee risks. Data loss prevention (DLP) proactively scans emails and notifies users before they send sensitive information. Information Rights Management (IRM) allows you to control access permissions to email to prevent unauthorized persons from printing, forwarding or copying confidential information. In addition, Office 365 gives you the option to use advanced threat protection (ATP) to protect mailboxes against sophisticated attacks in real time.

Learn more
Explore the threat landscape of email in “The current state of email security.”
Learn why now is the right time to take your mail on. www.office.com/setup
office.com/setup office.com/setup