ManagedMethods
  • Products
  • Free Trial
  • How It Works
    • Data Privacy
    • FAQs
  • Supported Apps
    • G Suite
    • Office 365
    • SaaS
  • Use Cases
    • Cyber Safety & Security
    • Data Security
    • Phishing & Malware Protection
    • Account Takeover Prevention
    • Student Self-Harm Detection
  • Customer Success Stories
  • Resources
    • Blog
    • Events & Webinars
    • Success Kits
    • More Resources
  • Company
    • In The News
    • Partners
    • Resellers
    • Careers
  • 1 (303) 415-3640
  • SUPPORT
  • CONTACT
  • Products Free Trial

    It’s NOT Just a Flesh Wound: How Employee Actions Impact Corporate Security

    July 13, 2016

    Until recently, computer security was viewed as though it were a medieval battle scene, like the one in Monty Python and the Holy Grail: The employees barricaded inside, under siege by an unruly army of hackers (or Trojan Rabbit) who are trying to spread viruses to infect and weaken the people inside.

    But this analogy couldn’t be further from the reality. Perimeter security fails because none of our workflows exist in a barricaded castle anymore. The internet changed that a long time ago. Our castles are completely permeable, connected and interdependent on the rest of the world. We forget that a large portion of our workflows exist on the World Wide Web, so walls don’t make a big difference. The drawbridge is always down and the guards are all asleep.

    When we don’t carefully consider security in all of the actions employees take on the internet, we are hacking ourselves. Hackers and competitors don’t need to code malware, they just keep their eyes open for something interesting. If a former employee downloads your confidential documents onto their phone and shares them with your competitor, you weren’t attacked, you were careless.

    Instead of picturing a dark room with a grinning face lit by the glow of computer monitor as your biggest digital security threat, you should just go to the bathroom and look in the mirror. The hardest part of reducing the risks of Shadow IT isn’t educating everyone else to follow the rules, it’s accepting that you should too.

    Written By: David Waugh

    Share this post

    CLOUD SECURITY INSIGHTS

    Get the latest cloud security insights delivered straight to your mailbox

    GET YOUR FREE TRIAL TODAY!

    Experience visibility and control with cloud security made easy. Start securing your organization’s cloud data!

    Start Your FREE Trial

    Categories

    • Account Takeover (2)
    • Cloud Access Security Broker (CASB) (35)
    • Cloud Risk Management (5)
    • Cloud Security (28)
    • Customer Success Stories (12)
    • Data Loss Prevention (11)
    • G Suite for Education Security (13)
    • Google Cloud Security (10)
    • Higher Ed Cloud Security (4)
    • In The News (107)
    • K-12 Cloud Risks (3)
    • K-12 Cloud Security (18)
    • K-12 Cyber Safety (9)
    • K-12 Cybersecurity (19)
    • K-12 Hybrid Learning Security (4)
    • K-12 Remote Learning (17)
    • Office 365 Cloud Security (7)
    • Product Updates (10)
    • SaaS Security (26)
    • Student Data Privacy (7)
    • The K-12 Tech Experience Podcast (2)

    Related Articles

    Aug 30, 2017 - SaaS Security

    Cloud Email: the obvious next step in cloud security

    Read More
    Jun 6, 2017 - SaaS Security

    Attention: IT has Moved to the Cloud. Why Hasn’t Security?

    Read More
    May 4, 2017 - SaaS Security

    Yesterday’s Google Docs Phishing Scheme: OAuth as an Attack Vector

    Read More
    • How It Works
    • Supported Apps
    • Use Cases
    • Partners
    • Resources
    • Company
    • Terms of Service
    • PRIVACY POLICY
    • Twitter
    • Linkedin
    • Youtube
    ©2020 ManagedMethods - Enfold WordPress Theme by Kriesi
    • Twitter
    • Linkedin
    • Youtube
    • Instagram
    • Facebook
    • How It Works
    • Supported Apps
    • Use Cases
    • Partners
    • Resources
    • Company
    • Terms of Service
    • PRIVACY POLICY
    A Delicate Balance: Corporate Security vs. User Productivity Cloud Apps on multiple devices Usability vs Security: What’s the Priority?
    Scroll to top