{"id":1494,"date":"2017-03-13T14:13:11","date_gmt":"2017-03-13T18:13:11","guid":{"rendered":"http:\/\/209.208.108.186\/?p=1494"},"modified":"2017-03-13T14:13:11","modified_gmt":"2017-03-13T18:13:11","slug":"employees-are-like-hacker-candy","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/","title":{"rendered":"Employees are like Hacker Candy"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1495\" src=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg\" alt=\"\" width=\"640\" height=\"426\" \/><\/a><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employees are still the central part of all our businesses. Even with all the technology, we still have people to run the operations. The human component of our business is the goal for most hackers. It is easier to find the human weakness than it is to find a network flaw. This human point of infiltration still needs attention, even when you feel your business is secure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers are smart and agile. It\u2019s a full-time job for them. They don\u2019t get called into meetings, get distracted by co-workers, or have to worry about receiving their W-2 in time for their tax advisors. Their focus is to get into your network using those distractions against your employees. Your employees are busy and focused on what they have to get done, many juggling multiple responsibilities. Hackers like these employees; it\u2019s like candy to them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Is there any one solution that will remove all risks? No. But there are ways you can help your employees protect themselves and your network. Ransomware, insider threats, phishing&#8211;there are so many threats that can halt operations that are critical to your business success. Be aware, prepare.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A combination of defenses helps you reduce the risks we all face in business today. Don\u2019t assume one will solve everything. Develop multiple layers of proactive security. This can include anything from making sure your Acceptable Use Policy (AUP) is current or having consistent employee training, to firewall and virus protection, to Web-use comprehensive <\/span><a href=\"https:\/\/www.wavecrest.net\/products\/cyfin\/reporter\/reporting.php\"><span style=\"font-weight: 400;\">monitoring<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.wavecrest.net\/products\/cyblock\/sa\/cyblock_security.php\"><span style=\"font-weight: 400;\">filtering<\/span><\/a><span style=\"font-weight: 400;\"> solutions. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is also important to have a recorded and tested recovery plan in place. Make the assumption that a breach will happen. This way you are prepared. Most importantly, maintain current backups. Make sure that the backups are not accessible through your network!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The \u201cone\u201d solution to protect your business just doesn\u2019t exist. Maintain a combination of defenses and solutions to cover as many risks as possible. Being proactive will pay off in the long run.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Trusted for over 20 years, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest&#8217;s Cyfin and CyBlock products to manage employee Internet usage &#8212; managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including <\/span><span style=\"font-weight: 400;\">General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security,<\/span><span style=\"font-weight: 400;\"> and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit <\/span><a href=\"https:\/\/www.wavecrest.net\"><span style=\"font-weight: 400;\">https:\/\/www.wavecrest.net<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Employees are still the central part of all our businesses. Even with all the technology, we still have people to run the operations. The human component of our business is the goal for most hackers. It is easier to find the human weakness than it is to find a network flaw. This human point of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[205,9],"tags":[219,312,420,119,5,134,131,497,140,374,20],"class_list":["post-1494","post","type-post","status-publish","format-standard","hentry","category-industry-news","category-security-threats","tag-control-employee-web-activity","tag-cyblock-2","tag-employee-monitoring","tag-employee-web-use","tag-internet-filtering","tag-malware","tag-network-security","tag-security-threats","tag-web-filtering","tag-web-security","tag-web-use-reporting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Employees are like Hacker Candy - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employees are like Hacker Candy - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"Employees are still the central part of all our businesses. Even with all the technology, we still have people to run the operations. The human component of our business is the goal for most hackers. It is easier to find the human weakness than it is to find a network flaw. This human point of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-13T18:13:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Employees are like Hacker Candy\",\"datePublished\":\"2017-03-13T18:13:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/\"},\"wordCount\":450,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg\",\"keywords\":[\"control employee web activity\",\"cyblock\",\"employee monitoring\",\"employee web use\",\"internet filtering\",\"malware\",\"network security\",\"Security Threats\",\"web filtering\",\"web security\",\"web-use reporting\"],\"articleSection\":[\"Industry News\",\"Security Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/\",\"name\":\"Employees are like Hacker Candy - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg\",\"datePublished\":\"2017-03-13T18:13:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#primaryimage\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Employees are like Hacker Candy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Employees are like Hacker Candy - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/","og_locale":"en_US","og_type":"article","og_title":"Employees are like Hacker Candy - Wavecrest Blog","og_description":"Employees are still the central part of all our businesses. Even with all the technology, we still have people to run the operations. The human component of our business is the goal for most hackers. It is easier to find the human weakness than it is to find a network flaw. This human point of [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2017-03-13T18:13:11+00:00","og_image":[{"url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Employees are like Hacker Candy","datePublished":"2017-03-13T18:13:11+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/"},"wordCount":450,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg","keywords":["control employee web activity","cyblock","employee monitoring","employee web use","internet filtering","malware","network security","Security Threats","web filtering","web security","web-use reporting"],"articleSection":["Industry News","Security Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/","url":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/","name":"Employees are like Hacker Candy - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#primaryimage"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg","datePublished":"2017-03-13T18:13:11+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#primaryimage","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/03\/chocolate-183543_640.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/employees-are-like-hacker-candy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Employees are like Hacker Candy"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=1494"}],"version-history":[{"count":1,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1494\/revisions"}],"predecessor-version":[{"id":1496,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1494\/revisions\/1496"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=1494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=1494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=1494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}