Skip to content


Winter is Coming: Time to Stoke Up the Human Firewall!

post img 5

Table of content

Winter may be coming, but the threat of winter storms is not the only danger out there to your business operations. One of the biggest and most neglected hazards to your business lies much closer to home: your employees.

The human factor is one of the most important aspects of your business’ security program. A recent report conducted by ProofPoint, Inc., found that on average one of every 25 malicious emails was clicked by a user, and that the majority of malicious messages are delivered during business hours. Today’s cyber-security attackers are looking to infiltrate businesses’ confidential data and systems by going through an organization’s employees, utilizing such tactics as phishing and malware to penetrate system security and access sensitive information. It’s critical to ensure your company’s security program takes into account the human firewall and works to minimize the possibility of human error. To help you get started, below are 4 ways you can stoke up your human firewall:

1. Educate Your Employees

The most important aspect of reducing human error is to raise awareness and conduct ongoing security training to educate your employees on potential threats. Training on such topics as malicious email identification and elements of untrustworthy websites reduces the chance employees click on emails and links that lead to network-infiltrating viruses. In order to be effective, training and awareness programs need to be continuous and focus on changing user behavior. By creating a company culture that is educated and practices effective security principals, your business will be better protected from potential threats.

2. Create Security Policies and Procedures

Putting specific policies and procedures in place guides employees toward better security practices and holds them accountable for their activities. An Acceptable Use Policy implements rules and responsibilities for employees to follow with regard to their computers and online activities. This policy may restrict accessing sites more vulnerable to malware and viruses, such as social media, and prohibit risky behavior, such as external file sharing, that could lead to loss of data or a security breach. Having these policies in place helps protect your company from immeasurable credibility or financial loss from a breach.

3. Control Data Access

Another way to enhance the human firewall is to encrypt data and password-protect sensitive documents and systems. With mobile technology continuing to increase and employees accessing more company data on the go, it’s important to ensure that documents and mobile devices themselves are properly protected. If an employee loses their phone or laptop, you want ensure that the person who finds the device doesn’t have full access to your company’s data.

4. Audit Controls and Logging Capabilities

It’s important to take a critical look at your employees’ access levels and the behaviors of where, when, and how they access your company’s data. By running an internal audit and spot-checking security practices, you can discover behavior that may be leaving your network and data vulnerable to attack, and correct the issue before it becomes a critical problem. If you determine there is a consistent, detrimental security practice among employees, it may be necessary to correct the problem by holding an employee training on the matter.

The human factor is an extremely important aspect of your company’s security, and involves ongoing training and awareness of security best practices. Without a properly educated and prepared human firewall, your company’s vulnerability to external attack is increased no matter how secure your network. Is your human firewall prepared? Contact us today for a security audit and assistance with employee awareness training. By protecting your business now, you’re protecting your future.


Recent Tweets


Want the latest IT insights?

Subscribe to our blog to learn about the latest IT trends and technology best practices.