Jones IT | Managed IT Services, IT Support, IT Consulting

View Original

6 Cybersecurity Bad Habits You Must Avoid

Most cybersecurity breaches arise from common mistakes and cybersecurity bad habits. These bad habits, which are mostly unintentional, start out as shortcuts, workarounds, and steps that bypass standard processes but slowly become the norm, especially if they make work a little easier. Such habits even convince us that we are only bypassing the red tape to do something more important. And curiously, businesses fall into cybersecurity bad habits as easily as individuals do.

Most of the time businesses carry on with poor cybersecurity habits without even realizing what they’re doing wrong. They are simply not aware of the risks that these bad security practices are exposing the company to. The scary thing is that even after they fall victim to a cyberattack, they may not realize that it was their habits that caused them to fall victim.

To help you recognize these bad habits, we have put together a list of common cybersecurity bad habits. I hope this will help you recognize and avoid them.

Cybersecurity Practices You Need To Avoid

Here’s the list of cybersecurity bad habits you must avoid:

See this content in the original post

Short, easy-to-guess passwords is a vulnerability that is most commonly exploited by cyber-criminals. On the other hand, long and complex passwords are often difficult to remember. People are so afraid of this that they often end up using the same password for multiple accounts. In fact, 59% of people use the same or similar password for multiple accounts. Besides, many write down their passwords where others can access them, or share them with colleagues or family members so that they don’t forget them. Such poor password management makes it easy for someone to hijack your account and commit fraud.

Many times, the fault is not with the users but rather with the super-users or admins. Standard security measures for network access have notoriously weak passwords such as “123456”, “qwerty”, and “password”. These passwords often remain unchanged making it very easy for malicious agents to compromise your network and steal your data.

See this content in the original post

There is no justification for not using 2FA ( two-factor authentication). It is 2019- it is really easy to set up and you don’t even need to use a token generator. Multi-Layered security, such as 2FA consists of an OTP (one-time-password) in combination with a memorized password. Using such a combination makes it really difficult to hack your accounts. 2FA is a great tool- is easy to implement and provides layered security, which is a must for every business.

We recommend using a password manager such as LastPass along with Google Authenticator. This will save you from memorizing passwords for all your business, personal, and social apps, which can be rather taxing on your memory.

See this content in the original post

Most companies tend to focus on preventive cybersecurity measures while neglecting to prepare for an actual security breach. While active cybersecurity measures will prevent the majority of the risks, they cannot guarantee 100% immunity to cybersecurity threats. No matter how well-protected your IT infrastructure is, you will definitely need a disaster recovery plan.

Loss of data is a business owner’s worst nightmare. Such a loss can cause irreparable damage to your business. Even if you get back to current working levels, your customers may never be able to trust you with their data again. Given the risk that loss of data poses, a reliable data backup and recovery solution is a must-have for every business.

A comprehensive backup and recovery plan will minimize downtime and help keep your business functioning seamlessly even in the case of a disaster such as a ransomware attack, virus infection, or a natural disaster.

See this content in the original post

Cybersecurity is not a one-time project. You can’t set it and forget it. In fact, this is one of the biggest mistakes that businesses make. They set up some IT security policies, implement some cybersecurity tools, and then leave it at that.

Cybersecurity threats are always evolving. With the advancement in technology, cyber-criminals are also becoming more advanced in their attacks. They are constantly working on newer ways to exploit your computer and/or network. For many of them, developing these programs is their full-time job.

Therefore, to keep your IT infrastructure safe and secure, you will need to periodically revisit your IT security plan and measures. You need to check if your IT security policies, tools, and procedures are still relevant and/or effective against the ever-evolving threats.

Regular penetration tests and phishing drills will help detect vulnerabilities and come up with fixes before they can be exploited.

See this content in the original post

We know that cybersecurity threats are ever-evolving. Therefore, to counter them, our knowledge of these threats also needs to keep pace. A little education can prevent the majority of cyber attacks as most of them are identifiable.

Human error has always been a big challenge to cybersecurity. A one-off IT security presentation during onboarding and orientation will never be enough. At any moment, people have many things in their head and are frequently multitasking at work. This can lead to a lapse in concentration and all it takes is an innocent click on a harmless-looking link to cause a massive breach.

Regular education about cybersecurity threats and preventive measures, password hygiene, and phishing drills should be part of your IT security plan. Periodically discuss your company’s IT policy along with your employees. Spear phishing attempts rely on the gullibility of your employees which may lead them to share sensitive information via email to a spoofed account of an authority figure. If employees know that the IT security policy prohibits them from sharing sensitive information via email or phone, then they are less likely to fall prey to such phishing attacks.

See this content in the original post

Overconfidence is probably the biggest security risk your business can face. Once you believe that you have implemented all the right IT security controls, you might be lulled into a false sense of security. And if there are no security incidents for a long period, you might think you are unhackable.

Further, most small businesses tend to think that they are too small a target for cybercriminals. But for a cybercriminal, you are never too small or too big. According to the 2019 Data Breach Investigations Report by Verizon, 43% of cyber attacks were targeted at small businesses while only 14% of small businesses rate their cybersecurity as highly effective. Because of overconfidence and lack of preparedness, small businesses tend to be very vulnerable to malware infections, ransomware attacks, and data breaches.


The best remedy for this bad habit is to have a plan that requires you to regularly revisit your IT security measures. You also need to stay up-to-date on the latest developments in cybersecurity, cyber threats, and the most effective strategies to counter them.

Preventing Cybersecurity breaches

No matter how careful we are about phishing, hacking, ransomware, etc. there is always the possibility that a threat may slip through the cracks. When educated properly and frequently, employees recognize the threats posed by a wide range of cybercriminal activities. Cybersecurity education should not just be about external threats but also about internal policies and security protocols. A well-informed workforce is a huge asset in your battle against cybercriminals.


At Jones IT, we take IT security very seriously. We have published a series of blogs on cybersecurity sharing useful information, tips, and general education. In this blog post, we shared with you some of the most common cybersecurity bad habits that we regularly come across. We would be happy to help you kick these habits as well as improve your cybersecurity measures. Click the button below to reach out to us today.


If you liked the blog, please share it with your friends

See this content in the original post