logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search

exc-5de3bdabb93cc92d39b4d49e

Balancing employee productivity with risk avoidance

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″ custom_padding=”5px|||||” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on” da_disable_devices=”off|off|off”][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

A single unauthorized download recently crippled the Louisiana state Office of Motor Vehicles (OMV) by infecting the government network with ransomware. This caused many of the office’s email and internet services to be disrupted, as the cybersecurity response team had to disconnect large portions of the network.

Impacts from cyberattacks often go beyond financial losses, affecting your clients’ operations

Not only did the attack disrupt the government’s network, but it impacted businesses such as trucking companies that couldn’t apply online for things like “overweight permits”. When you think of the far-reaching effects of an attack like this, the impacts can cause more than just productivity losses. There is the real potential for a loss of public trust in the organization that suffered the attack.

Telling employees to “be more careful” is not helpful when they have productivity goals

Employees often have the best of intentions when they want to download software from the internet. Giving them the benefit of the doutbt, they might think it will make them more productive. But if they don’t understand the risks of installing unauthorized software, the business is at risk of being put completely out of commission for days or weeks. Ransomware can not only lock up a computer by encrypting all of the data on it, but it can spread rapidly to all computers, servers and file storage systems connected to the same network.

If employees haven’t been properly engaged, is it really their fault?

Of course, it’s easy to point the finger at employees who didn’t follow a published security policy, as the Louisiana Cybersecurity Commissioner did by saying, “Somebody didn’t play by that book, and if it was up to me, I’d fire that person.”

The problem with taking this position is that employees are often trying to work with conflicting priorities, to be productive and at the same time, work safely with sensitive information and systems. If the organization doesn’t have an effective cybersecurity awareness program in place, then employees are often ill-equipped to remember the rules, or even to consult the procedures, in risky situations.

That’s not really their fault. It’s the fault of management who has not adequately prepared the employees to handle the risks they face on a daily basis, and make good decisions in the face of conflicting priorities.

Click Armor Gamified Security Awareness Training engages employees and improves knowledge retention

Want to assess your skill at avoiding phishing attacks?

Play the Click Armor self-assessment game

A reference article with more info on this incident can be found here.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column _builder_version=”4.4.6″ type=”4_4″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]

Share this article

[vc_empty_space height=”10px”]
[elfsight_social_share_buttons id=”1″]

Recent Posts

  • 0
    Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve
    June 16, 2025
  • 0
    Addressing AI opportunities and risks in your cyber security program
    March 13, 2025
  • 0
    What makes cyber security training boring
    March 3, 2025
  • 0
    A Canadian cybersecurity company’s lessons on training
    February 20, 2025
  • 0
    Cyber security training for executives: Why and how
    February 6, 2025
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use