{"id":1330,"date":"2016-05-24T10:16:34","date_gmt":"2016-05-24T14:16:34","guid":{"rendered":"http:\/\/209.208.108.186\/?p=1330"},"modified":"2016-05-24T10:16:34","modified_gmt":"2016-05-24T14:16:34","slug":"potential-victims-to-very-smart-thieves","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/","title":{"rendered":"Potential Victims to Very Smart Thieves"},"content":{"rendered":"<p><a href=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-1331\" src=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg\" alt=\"cat paw stealing cookie\" width=\"490\" height=\"303\" \/><\/a><\/p>\n<p>Employees need to know what their employers\u2019 philosophy is behind technology. Does my employer want me to use whatever app I choose? Can I just store and share work information where it is most convenient for me? Will my employer listen when I explain how much my cloud app does to improve my workflow? If you as the employer listen, you could save your business from an incident or a serious breach.<\/p>\n<p>It is amazing that the news is filled with data breach, data loss, ransomware, and spear phishing, and yet many businesses still think they are immune from an attack. If you are connected to the Internet, you are a highly susceptible victim. Do not take this to mean that you should not run your business with the highly efficient and collaborative tools that cloud services offer. It just means think and act to protect your enterprise assets and employees.<\/p>\n<p>Let\u2019s first cover where a major number of incidents start. Your enterprise weakness . . . the employee. It doesn\u2019t matter if you have the best employees in the universe, they are human. Hackers perfect the way they attack; that is their job. They have become so good at what they do that good employees send out W-2s, transfer millions to banks in foreign countries, and hand out their logon credentials without question.<\/p>\n<p>Now let\u2019s talk about what you can do to help your employees to not become victims.<\/p>\n<ul>\n<li>Educate them; make them a part of the process. Communicate. It is everyone\u2019s fight.<\/li>\n<li>Go ahead and make your most techy employee an honorary go-to person for others with questions.<\/li>\n<li>Gain visibility with <a href=\"https:\/\/www.wavecrest.net\/products\/cyfin\/reporter\/reporting.php\">proactive monitoring<\/a> tools. Trust me&#8211;this is not an employee privacy invasion. You need to know what is going on first; then make informed decisions.<\/li>\n<li>Make sure there is a process in place for an employee who questions something. Make the process part of your Acceptable Use Policy (AUP).<\/li>\n<\/ul>\n<p>And then the important basics we all know, but are worth repeating . . .<\/p>\n<ul>\n<li>Back up regularly and make sure your recovery process is tried and true. Think ransomware attack recovery, so keep it where you can get to it but others can\u2019t.<\/li>\n<li>Patch &#8211; There is no longer an option to do updates. Many are for security, so just do it and do it consistently. It\u2019s patch management, not patch whenever.<\/li>\n<li>Passwords &#8211; Maintain, manage, and get creative. Use a password manager if needed.<\/li>\n<li>Off-boarding &#8211; Make sure to purge all credentials for ex-employees or contractors. How do you know if they are still there? <a href=\"https:\/\/www.wavecrest.net\/products\/cyfin\/reporter\/reporting.php\">Monitor<\/a>!!<\/li>\n<li>Layered security &#8211; Get a firewall, but don\u2019t expect all-in-one add-ons to be impressive. For example, don\u2019t expect the firewall Web-use reporting feature to provide comprehensive and interactive reporting capability. Invest in the <a href=\"https:\/\/www.wavecrest.net\/products\/cyfin\/reporter\/reporting.php\">solution<\/a> that means serious employee Web-use reporting business&#8211;no more wishy-washy reports that are useless.<\/li>\n<\/ul>\n<p>Think and act to protect your enterprise assets and employees. Take some time to communicate with your employees about the exploits that they may fall prey to. It is not their fault; they are not an \u201cinsider threat\u201d but a potential victim to very smart thieves.<\/p>\n<p><b>About Wavecrest Computing<\/b><\/p>\n<p>Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest&#8217;s Cyfin and CyBlock products to manage employee Internet usage &#8212; managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit <a href=\"https:\/\/www.wavecrest.net\">https:\/\/www.wavecrest.net<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Employees need to know what their employers\u2019 philosophy is behind technology. Does my employer want me to use whatever app I choose? Can I just store and share work information where it is most convenient for me? Will my employer listen when I explain how much my cloud app does to improve my workflow? If [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[205],"tags":[522,312,313,505,186,327,521,157,140],"class_list":["post-1330","post","type-post","status-publish","format-standard","hentry","category-industry-news","tag-analytics","tag-cyblock-2","tag-cyfin-2","tag-employee","tag-monitoring","tag-phishing","tag-ransomware","tag-reporting","tag-web-filtering"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Potential Victims to Very Smart Thieves - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Potential Victims to Very Smart Thieves - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"Employees need to know what their employers\u2019 philosophy is behind technology. Does my employer want me to use whatever app I choose? Can I just store and share work information where it is most convenient for me? Will my employer listen when I explain how much my cloud app does to improve my workflow? If [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-24T14:16:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Potential Victims to Very Smart Thieves\",\"datePublished\":\"2016-05-24T14:16:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/\"},\"wordCount\":651,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg\",\"keywords\":[\"analytics\",\"cyblock\",\"cyfin\",\"employee\",\"monitoring\",\"phishing\",\"ransomware\",\"reporting\",\"web filtering\"],\"articleSection\":[\"Industry News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/\",\"name\":\"Potential Victims to Very Smart Thieves - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg\",\"datePublished\":\"2016-05-24T14:16:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#primaryimage\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Potential Victims to Very Smart Thieves\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Potential Victims to Very Smart Thieves - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/","og_locale":"en_US","og_type":"article","og_title":"Potential Victims to Very Smart Thieves - Wavecrest Blog","og_description":"Employees need to know what their employers\u2019 philosophy is behind technology. Does my employer want me to use whatever app I choose? Can I just store and share work information where it is most convenient for me? Will my employer listen when I explain how much my cloud app does to improve my workflow? If [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2016-05-24T14:16:34+00:00","og_image":[{"url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Potential Victims to Very Smart Thieves","datePublished":"2016-05-24T14:16:34+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/"},"wordCount":651,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg","keywords":["analytics","cyblock","cyfin","employee","monitoring","phishing","ransomware","reporting","web filtering"],"articleSection":["Industry News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/","url":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/","name":"Potential Victims to Very Smart Thieves - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#primaryimage"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg","datePublished":"2016-05-24T14:16:34+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#primaryimage","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2016\/05\/cat-paw-stealing-cookie.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/potential-victims-to-very-smart-thieves\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Potential Victims to Very Smart Thieves"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=1330"}],"version-history":[{"count":1,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1330\/revisions"}],"predecessor-version":[{"id":1332,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1330\/revisions\/1332"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=1330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=1330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=1330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}