Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    10 Security Risks Enterprises May Be Overlooking

    By
    Chris Preimesberger
    -
    July 2, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      110 Security Risks Enterprises May Be Overlooking

      1 - 10 Security Risks Enterprises May Be Overlooking

      by Chris Preimesberger

      2Your Dining Habits

      2 - Your Dining Habits

      Hackers are becoming increasingly creative in the ways that they infiltrate computer networks. In one case, hackers breached the computer network of an oil company by infecting the online menu of the employees’ favorite Chinese restaurant with malware. This type of watering-hole attack reflects the extent to which an adversary will go to attack a target.

      3Your Hotel Room

      3 - Your Hotel Room

      When traveling internationally, competitive rivals may be aware of your trip beforehand and will plan accordingly in order to take advantage while you’re on the road. If you are staying at a hotel and leave your laptop unaccompanied in your room while going to the gym, your chances of having your device compromised through the discreet installation of key-logging malware increases exponentially.

      4Other Risks to International Travelers

      4 - Other Risks to International Travelers

      Business travelers should always assume that they could be a target, particularly when traveling to known competitive intelligence destinations around the world, such as in Asia and Western Europe. If possible, use devices specifically designated for traveling that should only contain data relevant for the purpose of the trip.

      5The Lost Cell Phone

      5 - The Lost Cell Phone

      An effective bring-your-own-device (BYOD) policy increases employee efficiency and can build a happier, more productive workforce. It is crucial to standardize acceptable use policies that cover topics such as local storage of files, connectivity to the network and remote-wipe capability in case of loss.

      6The Insider Threat

      6 - The Insider Threat

      In many cases, data theft within organizations is linked to employees and others with legitimate access to systems, networks and sensitive data. This can be the result of inadvertent behaviors due to human error and a lack of policies or a deliberate breach attributed to a malicious insider. From a hiring perspective, comprehensive background checks and due diligence can help reveal a pre-hire’s connection to any potential competitive intelligence adversaries.

      7The Unlocked Server Rack

      7 - The Unlocked Server Rack

      Physical security should be considered at locations where IT infrastructure and data are stored and created. Alarms and guards may be necessary, but the most effective approach ensures physical security controls are mapped to well-defined and well-enforced policies and procedures.

      8Third-Party Web Applications

      8 - Third-Party Web Applications

      Research indicates that a limited number of exploits in only a handful of widely used third-party applications are responsible for nearly all successful enterprise malware infections on Windows clients. Transitioning away from commonly exploited applications and using less popular alternatives would prevent some exploits, because many of them target the libraries specific to those applications.

      9Your Cleaning Service

      9 - Your Cleaning Service

      Because external relationships are a reality of modern business operations, a proper analysis of vulnerability should extend to the various vendors, suppliers and other third parties within a company’s ecosystem—even the cleaning service. In the case of Target, a company that invested millions in malware detection and endpoint protection, the data breach was the result of stolen credentials belonging to a third-party vendor.

      10Your Document-Shredding Policy

      10 - Your Document-Shredding Policy

      Many companies don’t give file or document disposal a second thought. Employees toss documents in the trash or recycle bin, or delete them from a shared drive, and they think that’s the end of it. If a would-be data thief is looking for intellectual property or confidential information, the act of “dumpster diving” can lead to a potential goldmine.

      11The Unencrypted Email

      11 - The Unencrypted Email

      Although most companies understand the importance of secure file sharing, you’d be surprised by how many still communicate with third parties via unencrypted emails and employ generally poor WiFi practices. Organizations should implement tools that force storage encryption and encrypt data for end-to-end communication. They should also ensure that employees avoid using public WiFi networks.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×