{"id":5851,"date":"2021-02-04T22:34:06","date_gmt":"2021-02-05T05:34:06","guid":{"rendered":"http:\/\/clikcloud.com\/?p=6769"},"modified":"2021-02-04T23:50:24","modified_gmt":"2021-02-05T06:50:24","slug":"role-of-your-employees-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/","title":{"rendered":"Role of Your Employees in Cybersecurity"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">It\u2019s sometimes thought that employees can be a \u201cweak link\u201d in your cybersecurity plan. This need not be so. Rather, your employees&#8211;when well-trained in cybersecurity policies and practices&#8211;can be your greatest asset. Reason to learn about training your employees in keeping your network safe.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Assess Cybersecurity Knowledge<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Employees can be the most important line of defense against cyber attacks, when aware and well trained. Do your workers know your company\u2019s cybersecurity policies? Do they know and implement best practices with passwords, like having unique credentials that are changed regularly. Also, you can make sure they are up on the most current cyber threats like malware and phishing attempts, and know what to do when faced with a possible attack. For example, do they know what to do when they get an email designed to look like it\u2019s from their supervisor? Training sessions could be done routinely via video-conferencing on an ongoing basis for remote workers.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Security Considerations for Remote Work<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">For nearly a year, remote work has become the rule. According to an <\/span><a href=\"https:\/\/www.comptia.org\/blog\/eight-cybersecurity-tips-for-working-remotely\"><span style=\"font-weight: 400;\">article<\/span><\/a><span style=\"font-weight: 400;\"> from CompTIA, remote workers may not be prepared for increased responsibility for the safety of their devices. Are the devices connected to your company\u2019s network checked and sanitized to ensure malware can\u2019t get in? Do they have the most current antivirus and anti-malware definitions? Another issue to consider is physical security. Do your workers know to do simple things like log off when leaving the computer? Will they have a workspace where phone and video-conferencing communications can\u2019t be overheard? These are just some of the topics to discuss with your staff to keep your network safe. The more devices connected to the network, the more chances there are for cyber attack. Having workers know what to do to prevent or mitigate an attack is essential.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Instead of employees being cybersecurity liabilities, they can be your greatest assets. For assistance in training your staff to be your best line of defense against attack, contact us today. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&rsquo;s sometimes thought that employees can be a &ldquo;weak link&rdquo; in your cybersecurity plan. This need not be so. Rather, your employees&#8211;when well-trained in cybersecurity policies and practices&#8211;can be your greatest asset. Reason to learn about training your employees in keeping your network safe.<\/p>\n","protected":false},"author":1,"featured_media":5854,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[5,100],"tags":[118],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Role of Your Employees in Cybersecurity<\/title>\n<meta name=\"description\" content=\"It&rsquo;s sometimes thought that employees can be a &ldquo;weak link&rdquo; in your cybersecurity plan. This need not be so. Rather, your employees--when well-trained in cybersecurity policies and practices--can be your greatest asset. Reason to learn about training your employees in keeping your network safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/\",\"name\":\"Role of Your Employees in Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2021-02-05T05:34:06+00:00\",\"dateModified\":\"2021-02-05T06:50:24+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"It&rsquo;s sometimes thought that employees can be a &ldquo;weak link&rdquo; in your cybersecurity plan. This need not be so. Rather, your employees--when well-trained in cybersecurity policies and practices--can be your greatest asset. Reason to learn about training your employees in keeping your network safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Role of Your Employees in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Role of Your Employees in Cybersecurity","description":"It&rsquo;s sometimes thought that employees can be a &ldquo;weak link&rdquo; in your cybersecurity plan. This need not be so. Rather, your employees--when well-trained in cybersecurity policies and practices--can be your greatest asset. Reason to learn about training your employees in keeping your network safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/","url":"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/","name":"Role of Your Employees in Cybersecurity","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2021-02-05T05:34:06+00:00","dateModified":"2021-02-05T06:50:24+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"It&rsquo;s sometimes thought that employees can be a &ldquo;weak link&rdquo; in your cybersecurity plan. This need not be so. Rather, your employees--when well-trained in cybersecurity policies and practices--can be your greatest asset. Reason to learn about training your employees in keeping your network safe.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/role-of-your-employees-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Role of Your Employees in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5851"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=5851"}],"version-history":[{"count":1,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5851\/revisions"}],"predecessor-version":[{"id":5852,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5851\/revisions\/5852"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media\/5854"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=5851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=5851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=5851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}