Avoiding The Privacy Paradox In The Workplace

For cybersecurity professionals and online users alike, the burning question is no longer “do platforms bridge our privacy?” Rather, it’s “which platforms bridge our privacy?” Nowadays, data tracking is a known side effect of using internet-connected devices and services. And the data shows users are indeed concerned about, well, their data:

As many as 72 percent of Americans feel that all, almost all, or most of what they do online is being tracked by advertisers, technology firms, or other companies and 79 percent of Americans are concerned about how companies are using the data they collect about them.

  •     Over 80 percent of online users in the U.S. also feel that their data is vulnerable to hackers.
  •     Yet, 59 percent understand very little or nothing about what data companies collect.

What’s more, according to Norton research, 40 percent of Americans admit they don't know how to protect themselves from cybercrime. And cybercrime victims collectively spent 2.7 billion hours trying to resolve their dilemmas in the last 12 months. 

This dichotomy in how someone intends to protect our online privacy versus how they actually behave online is called the privacy paradox. And it can be a big problem for businesses - just think about that cybercrime recovery time. 

Considering cyber security teams are understaffed in the workplace, it’s up to decision-makers in the public and private sectors to encourage employees to be proactive about breaking the privacy paradox problem in the workplace. To that end, consider the following common places and platforms online users sacrifice their online privacy and how the risks can trickle down to organizations. 

Video Conferencing Services

The Covid-19 pandemic threw many workplaces into a remote-work mode, and many companies relied on video conferencing platforms to get through it. Even as organizations might move back into in-office meetings soon, video conferencing services are sure to stay in some capacity — and so are the cyber threats that come with them. These mainly regard webcams and the fact that cybercriminals can access them via spyware, committing a true invasion of online users’ privacy. 

    TIP: Instilling webcam awareness in employees, such as using a video background to not expose physical spaces, closing out video conferencing accounts after every call, and covering webcams when not in use, can all go a long way in protecting an employee and, in turn, organization’s privacy.  

Online Banking Institutions

Online banking is nothing new to companies and the staffers they employ. But what’s most overlooked is that online bank accounts are also the most sought-after platform for cybercriminals to hack into. 

    TIP: To level up your organization’s online banking activities, instill strong password practices in accounting or financial services departments. This means using a long, unique password and changing it often. A password managing software can also help keep track of the ever-evolving logins. In addition, opt for two-factor authentication, if it’s an option. 

Online Shopping Sites

Especially for employees with a company credit card handy, online shopping sites can be a bane to a business’s privacy. The convenient act of saving payment methods for later online shopping sites means these payment methods are sitting ducks in the event of a data breach.

    TIP: To offset any unfortunate circumstances, encourage employees to never create accounts on online shopping sites and instead manually input information for every individual transaction.    

Finally, a Virtual Private Network should be viewed as mandatory for every employees’ online activities. 

Pew Research:     Statista:      Norton LifeLock:      Image: Unsplash

You Might Also Read:

Why You Should Never Use A Free Proxy:

 

« Online Fraud Costs British Investors £63m
Cyber Security Mergers & Acquisitions - May 2021 »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

Infostream

Infostream

Infostream is a leading integrator of Digital Transformations Solutions (DTS); Public, Private, and Hybrid Cloud; Cybersecurity; Data Integrity; DevOps, DevSecOps, and Infrastructures.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

Astra Cybertech

Astra Cybertech

At Astra Cybertech, we're more than just cybersecurity experts - we're your partners in safeguarding your digital assets.