• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Employees are Weak Links

December 30, 2015 Posted by Nick DeLena Cybersecurity, IT Advisory Services, IT Security

These days, it’s tough to be a bank. Regulatory demands can be onerous and expensive. Pressure from consumers often means doing more for less. Political rhetoric from both parties over the future of regulation makes it difficult to conduct long term planning. If these factors weren’t contributing enough to managerial stress, hackers are now more creative than ever in targeting financial institutions.

IT Security Training

We believe a talented employee base can be a competitive differentiator. Organizations spend countless time and money seeking the best and brightest staff, fostering collaborative cultures, training, and developing employees. However, one area often overlooked in training programs is IT security. We often say that employees are the weakest link in the security profile of companies. One employee can compromise the entire organization by plugging in an infected USB stick or clicking a malicious link in an email. Millions of dollars spent on security infrastructure can possibly be undone by one simple action.

In Monday’s Wall Street Journal, the plight of IT security in banking was profiled. In one particularly striking part, it was reported that J.P. Morgan conducted a test by sending fake phishing emails to its 250,000 employees. More than 20% clicked on the links contained in the emails. Had these emails been real, 50,000 employees would have placed the organization at risk and potentially compromised their machines.

Another avenue of attack by hackers is social media. Hackers are scanning Twitter, Facebook, and LinkedIn, among others, for clues about targeted banks. Are your employees giving away harmful clues about themselves and the organization?

Every employee with a computer or a connected mobile phone represents a potential avenue through which your systems can be compromised. If that doesn’t generate concern, consider this – the Association of Corporate Counsel reports that roughly 30% of data breaches in 2015 were the result of employee error.

Do you have an IT training program? Does it include security? Are your policies and procedures providing sufficient guidance to staff and protecting the organization from a liability perspective? If a computer were to become compromised, what tools do you have in place to identify and isolate it before it affects other systems? The experts at O’Connor & Drew’s IT Audit & Security practice have decades of experience helping companies in the financial services sector protect their systems and staff against these types of threats. Call or email today to see how we can help secure your organization.

Tags: Penetration Testing
Share
1
Avatar photo

About Nick DeLena

Nick leads engagements across the division’s primary practice areas, including audit, security, and advisory services. He’s a 19-year veteran of IT and IT risk management, having audited, consulted, and managed IT teams in a variety of industries. He holds several leading certifications, including CISSP, CISA, CRISC, and Security+, among others, and has an MBA from Brown University.

You also might be interested in

The Increase in AI Phishing: Insights from KnowBe4’s Recent Report

The Increase in AI Phishing: Insights from KnowBe4’s Recent Report

Mar 31, 2025

Phishing attacks aren’t new, but the game has drastically changed[...]

Password Cracking 101

Jun 16, 2016

Featured in the May 2016 Massachusetts State Automobile Dealers Association (MSADA) Magazine (www.msada.org)  [...]

OCD TECH PATCH MANAGEMENT

Patch Management

Sep 22, 2023

Is a crucial aspect of maintaining the security and stability[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next