Uncategorized

Ways to Stop Staff from Flouting Security Protocols

Dtex’s 2019 Insider Threat Intelligence Report informed that 95 percent of company employees were flouting security protocols. It is a shocking revelation since web filters save employees from falling prey to cybersecurity breaches. In this article at Business 2 Community, Dale Strickland shares ways to stop employees from flouting security protocols.

Necessitating Security Protocols

When your employees are flouting security protocols, they are weakening the company defense too. If staff play games or access social media sites, they can easily fall prey to cyber traps. Flouting security protocols is common for people that visit suspicious or indecent websites. CIPA compliance should also be maintained to get E-Rate funding. Let’s see the ways employees can be susceptible to ignoring company guidelines:

  • DNS-Over-HTTPS (DoH): When you are flouting security protocols like DoH, you are coming out of the company network’s privacy wall.
  • Web and Application Proxy Servers: These are gateways between the user and the internet. Employees can hide behind third-party servers to surf the internet without any blockage.
  • Virtual Private Networks (VPN): It encrypts the pathway between two networks. Users can use the same to access unnecessary websites.
  • Cellular Hotspot: Companies insist that employees should utilize VPNs so that the IT cell can monitor if staff are misusing company hours for own work. With a personal cellular network, they can be easily flouting security protocols without the company’s knowledge and protection.
  • USB Web Browsing: PortableApps.com is a service that staff can leverage to use web browsers undetected.

Stop Fraudulent Activities

  • For DNS servers and cellular hotspot, use agent-based filters, canary domains, and active directory. Also, block web browsers.
  • Use web filtering, monitor employee activities, and limit them by enforcing policies to safeguard the proxy servers.
  • Block the VPN ports and extensions and supporting apps when you do not need them any longer.
  • Do not give access to unknown USBs and apps until they are identified as company assets.

More Rules

  • Do not give administrative privileges to employees for a long time.
  • Acceptable Use Policy (AUP) is a web filter that can further tighten your security policies.
  • Impose restrictions on accessing websites that do not improve productivity like social media platforms.

To view the original article in full, visit the following link: https://www.business2community.com/cybersecurity/how-employees-bypass-workplace-web-filters-how-to-stop-them-02356677

Indrani Roy

Indrani Roy is currently working as a Content Specialist for CAI Info India. She has knowledge in writing blogs, product descriptions, brand information, and coming up with new marketing concepts. Indrani has also transcribed, subtitled, edited, and proofread various Hollywood movies, TV series, documentaries, etc., and performed audio fidelity checks. She started her career by articulating a knowledge base for an IT client, and, eventually, went on to create user manuals and generate content for a software dashboard. Writing being one of her passions, reading books is naturally her favorite pastime. When not lost in the world of letters, she is a foodie, movie buff, and a theater critic.

Related Articles

Check Also
Close
Back to top button
X

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.