April 26, 2025
9
min read
Michael Hammond

Employees are Weak Links

Editor
Michael Hammond
Category
Cybersecurity
Date
April 26, 2025

These days, it's tough to be a bank. Regulatory demands can be onerous and expensive. Pressure from consumers often means doing more for less. Political rhetoric from both parties over the future of regulation makes it difficult to conduct long term planning. If these factors weren't contributing enough to managerial stress, hackers are now more creative than ever in targeting financial institutions.

IT Security Training

We believe a talented employee base can be a competitive differentiator. Organizations spend countless time and money seeking the best and brightest staff, fostering collaborative cultures, training, and developing employees. However, one area often overlooked in training programs is IT security. We often say that employees are the weakest link in the security profile of companies. One employee can compromise the entire organization by plugging in an infected USB stick or clicking a malicious link in an email. Millions of dollars spent on security infrastructure can possibly be undone by one simple action.In Monday's Wall Street Journal, the plight of IT security in banking was profiled. In one particularly striking part, it was reported that J.P. Morgan conducted a test by sending fake phishing emails to its 250,000 employees. More than 20% clicked on the links contained in the emails. Had these emails been real, 50,000 employees would have placed the organization at risk and potentially compromised their machines.Another avenue of attack by hackers is social media. Hackers are scanning Twitter, Facebook, and LinkedIn, among others, for clues about targeted banks. Are your employees giving away harmful clues about themselves and the organization?Every employee with a computer or a connected mobile phone represents a potential avenue through which your systems can be compromised. If that doesn't generate concern, consider this - the Association of Corporate Counsel reports that roughly 30% of data breaches in 2015 were the result of employee error.Do you have an IT training program? Does it include security? Are your policies and procedures providing sufficient guidance to staff and protecting the organization from a liability perspective? If a computer were to become compromised, what tools do you have in place to identify and isolate it before it affects other systems? The experts at O'Connor & Drew's IT Audit & Security practice have decades of experience helping companies in the financial services sector protect their systems and staff against these types of threats. Call or email today to see how we can help secure your organization.

Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

OCD Tech

25 BHOP, Suite 407, Braintree MA, 02184

844-623-8324

https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
SOC 2 ® Readiness Assessment
SOC 2 ®
SOC 3 ®
SOC for Cybersecurity ®
IT Advisory Services
IT Vulnerability Assessment
Penetration Testing
Privileged Access Management
Social Engineering
WISP
General IT Controls Review
IT Government Compliance Services
CMMC
DFARS Compliance
FTC Safeguards vCISO

Industries

Financial Services
Government
Enterprise
Auto Dealerships

Employees are Weak Links

By  
Michael Hammond
December 30, 2015
9
min read
Share this post

These days, it's tough to be a bank. Regulatory demands can be onerous and expensive. Pressure from consumers often means doing more for less. Political rhetoric from both parties over the future of regulation makes it difficult to conduct long term planning. If these factors weren't contributing enough to managerial stress, hackers are now more creative than ever in targeting financial institutions.

IT Security Training

We believe a talented employee base can be a competitive differentiator. Organizations spend countless time and money seeking the best and brightest staff, fostering collaborative cultures, training, and developing employees. However, one area often overlooked in training programs is IT security. We often say that employees are the weakest link in the security profile of companies. One employee can compromise the entire organization by plugging in an infected USB stick or clicking a malicious link in an email. Millions of dollars spent on security infrastructure can possibly be undone by one simple action.In Monday's Wall Street Journal, the plight of IT security in banking was profiled. In one particularly striking part, it was reported that J.P. Morgan conducted a test by sending fake phishing emails to its 250,000 employees. More than 20% clicked on the links contained in the emails. Had these emails been real, 50,000 employees would have placed the organization at risk and potentially compromised their machines.Another avenue of attack by hackers is social media. Hackers are scanning Twitter, Facebook, and LinkedIn, among others, for clues about targeted banks. Are your employees giving away harmful clues about themselves and the organization?Every employee with a computer or a connected mobile phone represents a potential avenue through which your systems can be compromised. If that doesn't generate concern, consider this - the Association of Corporate Counsel reports that roughly 30% of data breaches in 2015 were the result of employee error.Do you have an IT training program? Does it include security? Are your policies and procedures providing sufficient guidance to staff and protecting the organization from a liability perspective? If a computer were to become compromised, what tools do you have in place to identify and isolate it before it affects other systems? The experts at O'Connor & Drew's IT Audit & Security practice have decades of experience helping companies in the financial services sector protect their systems and staff against these types of threats. Call or email today to see how we can help secure your organization.

Share this post
Michael Hammond