Veronica Mun
Veronica Mun graduated from the University of Washington where she majored in Communication and Psychology. She is currently a member of the marketing team at Essential Security Software, an emerging email anti-theft software company based in Bellevue, WA.
Veronica Mun has written 4 articles for SB Informer.
View all articles by Veronica Mun...

The Business Security Quiz

Veronica Mun

March 20, 2007

1.0/5.0 (1 votes total)

Businesses are suffering major losses everyday because of lapse security policies, yet surprisingly enough, many are clueless to just how big of a problem security is becoming. You may think that a security threat isn't high-priority, but the amount of data breaches and data loss has been on the rise for the past several years.

Such threats do not only include hackers and scammers, but even one's own staff can put a business at risk. In fact, businesses are losing on average, $3.4 millions dollars per year, because of data breaches that involve internal sources. (1)

Lack of security education and data risk policies can toss your company's reputation and business advantage the dumpster.

To test yourself, answer these questions to find out just how much you know about business security and data vulnerability issues facing us today.

Which of the following is the biggest threat to a company?

a) Computer Viruses

b) Hackers

c) Your employees

d) The paper shredder

The correct answer is (c). Many companies spend millions of dollars trying to secure their companies assets from external threats when a large portion of companies suffer losses because of their very own employees. McAfee’s senior director stated that “The harsh reality is that sensitive corporate data can easily end up in the wrong hands — deliberately or accidentally — because of employee behavior." (2)

So, exactly how many employees put companies at risk for data loss?

a) 10% of employees

b) 20% of employees

c) 30% of employees

d) 40% of employees

The correct answer is (b). That's 1 out of every 5 employees! These risks include small slip ups like printing sensitive information that never gets picked up from the printer tray, to obvious slip ups like taking work home on a laptop without encrypting files.

What is the most common vehicle used for data transfer?

a) USB flash drive


c) Laptops

d) Email

The correct answer is (d). Email is used by 88% of employees to transfer data between employees and clients. This is bad news because there are many direct ways to secure information on flash drives, data discs and laptops. You could lock them up, closely monitor their use, you could even directly encrypt the information each medium contains; but what about email? It is intangible so it can't be locked up, and although attachments can be encrypted, what about the actual email message itself?

What is the solution to this problem?

a) Don't use Email

b) Use email anti-theft software

c) Monitor all work and personal email accounts

d) Oh well, just make sure the press doesn’t find out

The correct answer is (b). Using email anti-theft software will help to prevent copying, editing, printing, and/or forwarding of your email message and its attachments. Email anti-theft solutions ensure that only the intended recipient can view the email and nobody else, and can even encrypt documents held on a laptop or flash drive.

Business security can’t be trivialized or pushed under the rug in hopes that nothing happens. Everyone at your organization should be held accountable for their actions: every executive, employee, department head, and even outside contractor. (3) Emphasize how important their role is in upholding security guidelines and make your staff aware of the consequences that may follow from their actions.

Companies must take time to create firm security policies and implement security solutions that fits their business needs. Every month or week your company neglects putting business security in place puts your clients, files and intellectual property at risk.

End Notes:
1) “Cyber Security Statistics”.
2) Keizer, Gregg. “Workers Ignore Data Rules”. Information Week. 5 Feb. 2006.
3) Bender, David. “Why You Must Have a Security Breach Response Plan.” 15 Feb. 2006.


Add comment Add comment (Comments: 0)  



Related Resources

Other Resources