{"id":18130,"date":"2018-05-22T08:00:20","date_gmt":"2018-05-22T12:00:20","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18130"},"modified":"2022-04-27T15:12:59","modified_gmt":"2022-04-27T19:12:59","slug":"how-to-be-a-good-employee-and-reduce-security-risks-to-your-company","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/how-to-be-a-good-employee-and-reduce-security-risks-to-your-company\/","title":{"rendered":"How to Be a Good Employee and Reduce Security Risks to Your Company"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As more and more companies operate in a digital world, it\u2019s imperative that employees understand how to handle sensitive corporate information appropriately. Recently, hackers <\/span><a href=\"https:\/\/paymentweek.com\/2018-4-5-saks-lord-taylor-breach-may-traced-phishing-scam\/\"><span style=\"font-weight: 400;\">were able to obtain five million credit and debit card numbers<\/span><\/a><span style=\"font-weight: 400;\"> by breaching the security at both Saks, Inc. and Lord &amp; Taylor. The result is a devastating hit for both organizations, but more tragic is how easily the situation could have been avoided.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The hackers were able to access the system of both retailers through an online phishing attempt in which an employee likely opened a malicious email or web link. With access to sensitive information, employees are one accidental click away from causing a detrimental disaster. Here are some tips on being the best employee at your organization and keeping company secrets safe.<\/span><\/p>\n<p><b>Follow Best Practices to Avoid Phishing<br \/>\n<\/b><span style=\"font-weight: 400;\">Let\u2019s begin by tackling the misstep that led to Saks, Inc. and Lord &amp; Taylor taking such a hard hit. Phishing attempts happen when a malicious individual attempts to gain your trust to obtain sensitive information. Two conventional methods of phishing can include having you actively respond to what you believe is a safe email or merely manipulating you into clicking on a dangerous link.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/5-things-can-prevent-phishing-scams-work\/\"><b>5 Things You Can Do to Prevent Phishing Scams at Work<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">When receiving an email, be sure to note where the message originated from. On a computer, use your mouse to hover over the email\u2019s \u2018From\u2019 field to view the full email address of the sender. You can accomplish the same on your smartphone by tapping on the \u2018From\u2019 field with your finger. Carefully gauge if the name of the sender matches a known email address. Hackers will try to create fake, but eerily similar email addresses of your colleagues to fool you. If the name and known email address don\u2019t match up, there\u2019s a chance you could be the target of a phishing attack. Be sure to contact your company&#8217;s IT department for further instructions.<\/span><\/p>\n<p><b>Securely Lock Your Mobile Device<br \/>\n<\/b><span style=\"font-weight: 400;\">The amount of information we carry around on our smartphones can be surprising. In addition to your personal information, there\u2019s a good chance that you might have a corporate email account on your device. Or perhaps, you may have direct access to critical systems. For those reasons alone, it\u2019s vital to <\/span><a href=\"https:\/\/www.androidcentral.com\/password-protect-your-phone\"><span style=\"font-weight: 400;\">protect your smartphone with a password<\/span><\/a><span style=\"font-weight: 400;\"> or pin code. Avoid using memorable dates, repetitive patterns or other easily guessable information when securing your device.<\/span><\/p>\n<p><b>Increase Your Device\u2019s Security<br \/>\n<\/b><span style=\"font-weight: 400;\">It can be challenging to ensure your device remains wholly secure and unaffected by malicious malware &#8211; after all, we\u2019re only human. Your best defense is using a third-party solution to keep an eye on your device at all times. An app such as <\/span><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=reduce_security_risks_to_your_company\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">df<\/span><\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">ndr secur<\/span><\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">ity<\/span><\/span><\/a><span style=\"font-weight: 400;\"> has an anti-hacking feature, which alerts you to malicious websites before you even click on a link. Helping yourself with some personal security can aid your professional life, and hopefully, your proactive steps will win you an \u201cemployee of the year\u201d award.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A major breach at Saks and Lord &amp; Taylor allowed hackers to obtain sensitive consumer data. The culprit? A single employee who could have easily prevented it.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[194],"tags":[9,358,545,249,67,223],"class_list":["post-18130","post","type-post","status-publish","format-standard","hentry","category-tips-tutoriais","tag-mobile","tag-protection","tag-safety","tag-security","tag-smartphone","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18130"}],"version-history":[{"count":5,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18130\/revisions"}],"predecessor-version":[{"id":18710,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18130\/revisions\/18710"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}