The 5 security threats that could be circling your networkThe 5 security threats that could be circling your network

A recent survey from the Information Systems Audit and Control Association has found that in 2013, 22 percent of organisations suffered from a security breach. Additionally, 21 percent said they had experienced a mobile device breach in security.

Here is a brief look into what respondents experienced and the network security issues most likely to cause you a problem.

1. External hacking

Hacking has always been a clear and present threat to any network and the data it holds, and now the cyber criminals are using increasingly sophisticated techniques. It is important to ensure that all security software is kept up to date and properly configured and that regular intrusion detection and penetration testing is carried out.

2. Data leaks

Your business critical data could be damaging to you in the wrong hands, and it is essential that you do everything you can to protect your business against data leak or theft. By keeping strict control of your mobile devices, protecting your network and encrypting your data, you can do all you can to make your data useless if it is stolen or to deny access to it altogether.

3. Accidental employee errors

The dreaded “inside job” where an employee knowingly steals or damages business data often plays on the mind of the IT manager, but there are many accidental errors that can be made that could have the same devastating results. Malware on USB or mobile devices, loss or theft of mobile devices and storing files on insecure storage sites are just some of the ways your employees can inadvertently cause a risk to your business.

4. Personal bring-your-own-devices (BYODs)

Do you allow your employees to connect their personal devices to your network? If you do you could be putting your network and your critical data and systems at risk. This is because you can never be 100% sure that your employees are using the latest anti-virus or malware detection software. The best approach is to deny access on your network to any device that is not in your business inventory and that does not have the right security suite of software installed.

5. Disgruntled employees

An employee with a grudge or chip on their shoulder could be a big danger to your business, especially if they have top-level access to your network. Unless an employee has directly threatened to do damage on the network, there is often little warning that an employee is about to go on a digital rampage. However, you can make sure you have strict account termination or suspension policies in place for when employees are suspended or fired, or when they leave of their own accord.