WJR Business Beat with Jeff Sloan: Remote Workforce and Cyber Security Protocol Compliance (Episode 277)

On today’s Business Beat, Jeff discusses the importance of cybersecurity for employees working remotely, as well as solutions to a recent trend in compliance issues with cybersecurity protocols.

Tune in to the Business Beat, below, to learn more about how companies and their employees can to take cybersecurity more seriously:

Tune in to News/Talk 760 AM WJR weekday mornings at 7:11 a.m. for the WJR Business Beat. Listeners outside of the Detroit area can listen live HERE. Are you an entrepreneur with a great story to share? If so, contact us at [email protected] and we’ll feature you on an upcoming segment of the WJR Business Beat!

Good morning, Paul!

You know what’s got me concerned on this fine Wednesday morning in Detroit. Well, it’s this. A new study indicates that half of all remote workers are not following company protocols with respect to cybersecurity. It’s bad enough that businesses today have to protect against hackers spending precious dollars to keep cybercriminals from ruining our businesses.

But now we are finding out that remote team members are not taking the matter seriously enough to simply follow company protocols, which prevents hackers from having easy access into the. And a report on remote workforce security released last week, 52% of remote workers finding work arounds to their organization’s security policies.

The report prepared by cybersecurity insiders found that the top three security policies and protocols remote workers were most resistant to comply with were multifactor authentication, mobile device managers and password managers. Now granted, most employees circumventing security policies don’t do it typically with malicious intent.  

The report prepared by cybersecurity insiders found that the top three security policies and protocols remote workers were most resistant to comply with were multifactor authentication, mobile device managers and password managers. Now granted, most employees circumventing security policies don’t do it typically with malicious intent.  

Rather they perceive following security measures as just getting in their way. And that’s downright dangerous for the company’s wellbeing. So what to do? First, make sure the protocols and expectations for compliance are made clear to your staff, provide every employee with a document, explaining what to do, how to do it, and what’s expected from them in order to comply. Two, make sure there’s as little encumbrance as possible to following your protocols and make sure you make it safe. And three, as was once famously said, trust but verify. Unfortunately, trust alone isn’t going to cut it. You need to track your team’s compliance and not tolerate any breach of what’s expected.  

I’m Jeff Sloan, founder and CEO of StartupNation.com, and that’s today’s Business Beat, on the Great Voice of the Great Lakes, WJR.  

Total
0
Shares
Leave a Reply
Related Posts
Photo illustration of a man connecting with artificial intelligence to improve skills in an Image by Freepik Image by freepik
Read More

Upskilling: What It Is and 5 Ways to Upskill Your Team Using AI

As technology continues to adapt and create new opportunities within the workplace, it becomes increasingly important for companies to fill these new roles with candidates who possess specialized skills.    Upskilling lets organizations close the...
Group of people having a meeting in sleek offices.
Read More

5 Costs You Can Cut Without Killing Your Startup

When you're building your dream startup, cutting costs can seem like a step back. But that's not true.  As you grow and expand, keeping costs in check becomes crucial for your long-term success. It's like...