The Business Security Quiz - How much do you know about business security?
- Date: 2007-03-15 - Word Count: 716
Share This!
Summary:
Exactly how much do you really know about business security? Do you feel that you're careful at work with electronic files? Some of your everyday tasks might be the cause of a data breach. A stray or lost laptop, word documents, spreadsheets and leaked customer information over email can cause financial and reputation problems to your company. To further your knowledge about how you and your company can play an active role in creating a security plan, take this quiz to test your security knowledge.
Businesses are suffering major losses everyday because of lapse security policies, yet surprisingly enough, many are clueless to just how big of a problem security is becoming. You may think that a security threat isn't high-priority, but the amount of data breaches and data loss has been on the rise for the past several years.
Such threats do not only include hackers and scammers, but even one's own staff can put a business at risk. In fact, businesses are losing on average, $3.4 millions dollars per year, because of data breaches that involve internal sources. (1)
Lack of security education and data risk policies can toss your company's reputation and business advantage the dumpster.
To test yourself, answer these questions to find out just how much you know about business security and data vulnerability issues facing us today.
Which of the following is the biggest threat to a company?
a) Computer Viruses
b) Hackers
c) Your employees
d) The paper shredder
The correct answer is (c). Many companies spend millions of dollars trying to secure their companies assets from external threats when a large portion of companies suffer losses because of their very own employees. McAfee's senior director stated that "The harsh reality is that sensitive corporate data can easily end up in the wrong hands - deliberately or accidentally - because of employee behavior." (2)
So, exactly how many employees put companies at risk for data loss?
a) 10% of employees
b) 20% of employees
c) 30% of employees
d) 40% of employees
The correct answer is (b). That's 1 out of every 5 employees! These risks include small slip ups like printing sensitive information that never gets picked up from the printer tray, to obvious slip ups like taking work home on a laptop without encrypting files.
What is the most common vehicle used for data transfer?
a) USB flash drive
b) CD/DVD
c) Laptops
d) Email
The correct answer is (d). Email is used by 88% of employees to transfer data between employees and clients. This is bad news because there are many direct ways to secure information on flash drives, data discs and laptops. You could lock them up, closely monitor their use, you could even directly encrypt the information each medium contains; but what about email? It is intangible so it can't be locked up, and although attachments can be encrypted, what about the actual email message itself?
What is the solution to this problem?
a) Don't use Email
b) Use email anti-theft software
c) Monitor all work and personal email accounts
d) Oh well, just make sure the press doesn't find out
The correct answer is (b). Using email anti-theft software will help to prevent copying, editing, printing, and/or forwarding of your email message and its attachments. Email anti-theft solutions ensure that only the intended recipient can view the email and nobody else, and can even encrypt documents held on a laptop or flash drive.
Business security can't be trivialized or pushed under the rug in hopes that nothing happens. Everyone at your organization should be held accountable for their actions: every executive, employee, department head, and even outside contractor. (3) Emphasize how important their role is in upholding security guidelines and make your staff aware of the consequences that may follow from their actions.
Companies must take time to create firm security policies and implement security solutions that fits their business needs. Every month or week your company neglects putting business security in place puts your clients, files and intellectual property at risk.
_____________________________
End Notes:
1) "Cyber Security Statistics". Entrepreneur.com.
2) Keizer, Gregg. "Workers Ignore Data Rules". Information Week. 5 Feb. 2006.
3) Bender, David. "Why You Must Have a Security Breach Response Plan." Law.com. 15 Feb. 2006.
_____________________________
About the Author
Veronica Mun graduated from the University of Washington where she majored in Communication and Psychology. She is currently a member of the marketing team at Essential Security Software, an emerging email anti-theft software company based in Bellevue, WA.
Exactly how much do you really know about business security? Do you feel that you're careful at work with electronic files? Some of your everyday tasks might be the cause of a data breach. A stray or lost laptop, word documents, spreadsheets and leaked customer information over email can cause financial and reputation problems to your company. To further your knowledge about how you and your company can play an active role in creating a security plan, take this quiz to test your security knowledge.
Businesses are suffering major losses everyday because of lapse security policies, yet surprisingly enough, many are clueless to just how big of a problem security is becoming. You may think that a security threat isn't high-priority, but the amount of data breaches and data loss has been on the rise for the past several years.
Such threats do not only include hackers and scammers, but even one's own staff can put a business at risk. In fact, businesses are losing on average, $3.4 millions dollars per year, because of data breaches that involve internal sources. (1)
Lack of security education and data risk policies can toss your company's reputation and business advantage the dumpster.
To test yourself, answer these questions to find out just how much you know about business security and data vulnerability issues facing us today.
Which of the following is the biggest threat to a company?
a) Computer Viruses
b) Hackers
c) Your employees
d) The paper shredder
The correct answer is (c). Many companies spend millions of dollars trying to secure their companies assets from external threats when a large portion of companies suffer losses because of their very own employees. McAfee's senior director stated that "The harsh reality is that sensitive corporate data can easily end up in the wrong hands - deliberately or accidentally - because of employee behavior." (2)
So, exactly how many employees put companies at risk for data loss?
a) 10% of employees
b) 20% of employees
c) 30% of employees
d) 40% of employees
The correct answer is (b). That's 1 out of every 5 employees! These risks include small slip ups like printing sensitive information that never gets picked up from the printer tray, to obvious slip ups like taking work home on a laptop without encrypting files.
What is the most common vehicle used for data transfer?
a) USB flash drive
b) CD/DVD
c) Laptops
d) Email
The correct answer is (d). Email is used by 88% of employees to transfer data between employees and clients. This is bad news because there are many direct ways to secure information on flash drives, data discs and laptops. You could lock them up, closely monitor their use, you could even directly encrypt the information each medium contains; but what about email? It is intangible so it can't be locked up, and although attachments can be encrypted, what about the actual email message itself?
What is the solution to this problem?
a) Don't use Email
b) Use email anti-theft software
c) Monitor all work and personal email accounts
d) Oh well, just make sure the press doesn't find out
The correct answer is (b). Using email anti-theft software will help to prevent copying, editing, printing, and/or forwarding of your email message and its attachments. Email anti-theft solutions ensure that only the intended recipient can view the email and nobody else, and can even encrypt documents held on a laptop or flash drive.
Business security can't be trivialized or pushed under the rug in hopes that nothing happens. Everyone at your organization should be held accountable for their actions: every executive, employee, department head, and even outside contractor. (3) Emphasize how important their role is in upholding security guidelines and make your staff aware of the consequences that may follow from their actions.
Companies must take time to create firm security policies and implement security solutions that fits their business needs. Every month or week your company neglects putting business security in place puts your clients, files and intellectual property at risk.
_____________________________
End Notes:
1) "Cyber Security Statistics". Entrepreneur.com.
2) Keizer, Gregg. "Workers Ignore Data Rules". Information Week. 5 Feb. 2006.
3) Bender, David. "Why You Must Have a Security Breach Response Plan." Law.com. 15 Feb. 2006.
_____________________________
About the Author
Veronica Mun graduated from the University of Washington where she majored in Communication and Psychology. She is currently a member of the marketing team at Essential Security Software, an emerging email anti-theft software company based in Bellevue, WA.
Related Tags: policy, company, computer, business, loss, data, security, email, threat, flash, theft, quiz, hack, drive, essential, employee, print, hard
I am a current member of the marketing team at Essential Security Software, an email anti-theft company based in Bellevue, WA. Your Article Search Directory : Find in Articles
Recent articles in this category:
- Ringtones for Cell Phones 101
A ringtone is a sound file that is used on acellular or mobile phone. This smart idea was deve - Sony Reader PRS-505 Review - Is it Worth Your Money?
The Sony Reader 505 has become an attractively affordable ebook reader since the Sony Reader P - Prototyping knowledge: about an .STL file and how to save it?
Following are guidelines for exporting from typical CAD modelers:Most CAD systems, File Save a - Logitech Digital Video Security System
Since the dawn of time people have always been afraid of others coming into their cave, it's a - The History of GPS Technology
Normal 0 false false false MicrosoftInternetExplorer4 /* Sty - The Future of VOIP Technology
Normal 0 false false false MicrosoftInternetExplorer4 /* Sty - 10 Things You Need to Know About NY VOIP
Normal 0 false false false MicrosoftInternetExplorer4 /* Sty - Video Cameras
Today, video cameras are extremely affordable, very easy to use and offer high quality video a - Making Data Administration a Part of Your Small Business
At some point it will happen to every company no matter how big orsmall they are. System failu - How to Choose a New York VOIP Service Provider
New Yorkers know a good thing when they see it, and VOIP technology iscurrently taking the Emp
Most viewed articles in this category:
- Bluesnarfing
IntroductionBluetooth a short range wireless communication technology developed for use at home, off - Visibility Eto Erp and Six Sigma Profiled in Quality Digest
According to Stephen Carson, executive vice president for Visibility Corp., "Many project-based manu - Four Trends for Distributors: Facing the Forces of Change
The four definitive trends listed in the National Association of Wholesalers-Distributors' publicati - Gateway Laptop Review
You may consider the M255-E if you are thinking about purchasing a Gateway laptop. At first glance, - Ipod Buying Guide &Tips - Ipod, Nano, Shuffle
Buying Ipod is just like buying a piece of enjoy-ment. The first criteria is to buy something you w - Texas Cement Choose Batchmaster for Process Manufacturing Erp
BatchMaster Software, Inc. (www.batchmaster.com), a leading provider of ERP (enterprise resource pla - Industrial CRM Must be Preceded by Change Management
Entitled Smart Practices That Pay: Leveraging Information to Achieve Industrial Selling Results, thi - Canada's Cosmaceutical Wins With Batchmaster ERP
Cosmaceutical Research Lab, already the largest contract manufacturer for cosmetic products in weste - Science is the Real God
Every religion in the world claims that its particular God is almighty. However, there is nothing in - Still wondering what VoIP is about?
So what is VoIP? Internet telephony is a rapidly-growing phenomenon that shows no sign of slo