Computer Blind Spots (£)
The majority of businesses have a number of areas of their organisation, which are not analysed properly and reviewed for potential cyber breach.
For instance one is when new PCs are added to a department and the old ones are shut down, stored or deposed of.
First are they still kept within the department or in offices near-by and could they be opened and worked and scanned for information by an employee who wants to up-set or steal from the processes.
Second managed devices experienced some of the higher security incidents, despite the current expenditure in security technology. Managed computers systems currently have some of the highest network-based security attacks.
One area that is not monitored and understood enough is bring your own computer devices to work schemes. A while ago this was considered an efficient and easy way to encourage work from outside the organisation and work for home to be used and employed to increase the employees participation in the current workloads.
However what is now clear is that this one of the ways in which malware and problem software is allowed to get into the business computer systems because the BYOD (bring your own device) process has allowed malware et al to enter the system – not necessarily because the employee intended this to happen but purely because the business security systems do not take the necessary security percussions.