The Human Errors That Can Put Your Business In Danger

The Human Errors That Can Put Your Business In Danger

When it comes to online attacks and data hacks, it’s something that is rarely out of the news. As much as we might think that the biggest cause for such attacks are cybercriminals, data released under the Freedom of Information Act reveals that human error is seven times more likely to cause data protection breaches than hackers.

Play Quizzes 4

For that reason Cloud Geeni looked at some of the most common every-day risks when it comes to data privacy infringements.

How A Weakening PE Market Serves As Another Sign Of A Weakening Economy

InvestAmid the turmoil in the public markets and the staggering macroeconomic environment, it should come as no surprise that the private markets are also struggling. In fact, there are some important links between private equity and the current economic environment. A closer look at PE reveals that the industry often serves as a leading indicator Read More

Get Our Activist Investing Case Study!

Get the entire 10-part series on our in-depth study on activist investing in PDF. Save it to your desktop, read it on your tablet, or print it out to read anywhere! Sign up below!

Q2 hedge fund letters, conference, scoops etc

The hosted desktop solutions company has created a visual showcasing example of situations that can put your business in danger when it comes to data protection breaches.

Remote workers

More and more businesses are allowing their staff to work remotely. While this has many positive benefits for both the employers and employees, removing personal and sensitive data from the office does generate additional data security risks.

For example, simply leaving a laptop open when working on a train could result in a severe data breach. According to iPass, remote and mobile workforce is the biggest threat to your business's data security.

To help to prevent data loss or theft, make sure your business has relevant policies and procedures in place. Things like Two Factor Authentication (2FA), adequate password controls, implementing antivirus software, and the ability to quickly remove sensitive data from devices remotely (e.g. via a hosted desktop) can help to reduce the risk.

Phishing attacks

According to research from Mimecast, 94% of organisations have experienced either phishing or spear phishing attacks in the past 12 months. This highlights how important it is to make sure that your employees know how to recognise such scams.

Criminals are getting more sophisticated, and sometimes it’s almost impossible to tell a fake email from a real one. For that reason, make sure you look at how else you can improve your resilience against phishing. For example, by implementing anti-spoofing controls such as DMARC, SPF and DKIM.

Handling personal data

Without relevant security measures in place, it’s easy to see how printed information left on a desk could be viewed or stolen. But that’s not the only way information can be misused, even unattended computers are a threat - because if someone sits at a desk other than their own, they could get access to data that they are not authorised to see. Protect your business from this threat and implement a ‘Clear Desk and Screen’ policy and ensure your employees abide by it.

Confidential data

Another important step is to ensure that personal and sensitive data is correctly disposed of, otherwise, it can fall into the wrong hands. Your organisation should correctly destroy and get rid of all confidential waste (e.g. via a corporate shredding policy and media destruction service).

Unauthorised systems, apps and devices

Systems, apps and devices that are not effectively managed are vulnerable to attack. It’s very important that you establish what devices and applications your employees can use. It’s also essential to ensure your team members are not downloading unauthorised software onto their work devices. This will avoid the risk of malware or ransomware.

Also, where people are using their personal devices to access confidential information, businesses should create a BYOD policy to confirm what devices and applications are allowed to access your network, where and how it can be accessed, and the consequences of breaching the policy.


According to the Information Commissioner’s Office (ICO), most security breaches happen because of distractions or mistakes. For example, it’s all too easy to send an email to multiple customers without using the blind carbon copy functionality.

If an employee allows the recipients of an email to see each other’s email addresses, your business could face a data breach investigation.

Mistakenly attaching the wrong information to an email, misspelling an email address or sending it to the wrong person are also common data privacy errors. In response, there must be strict policies and procedures in place to ensure the safe processing of information.

Offline data

It’s also offline data we need to be aware of. For example, sticking the wrong address label on an envelope and posting it to the wrong person could also have serious consequences. So, when it comes to data protection, it pays to consider all the different ways you use and share data.

Human Errors

Updated on

Jacob Wolinsky is the founder of, a popular value investing and hedge fund focused investment website. Jacob worked as an equity analyst first at a micro-cap focused private equity firm, followed by a stint at a smid cap focused research shop. Jacob lives with his wife and four kids in Passaic NJ. - Email: jacob(at) - Twitter username: JacobWolinsky - Full Disclosure: I do not purchase any equities anymore to avoid even the appearance of a conflict of interest and because at times I may receive grey areas of insider information. I have a few existing holdings from years ago, but I have sold off most of the equities and now only purchase mutual funds and some ETFs. I also own a few grams of Gold and Silver
Previous article ICE Raids Begin Sunday, But Targets Are Getting Dangerous Advice
Next article Blurams Home Pro A10C Home Security Camera Unboxing & Review

No posts to display