5 Risky Things You’re Doing on Your Work Computer

Advertising Disclosure: When you buy something by clicking links on our site, we may earn a small commission, but it never affects the products or services we recommend.

Image Not Available

This post comes from Kelly Santos at partner site Credit.com.

With technology driving business growth, more companies are implementing bring-your-own-device policies in the workplace. Almost 2 in 3 IT professionals believe employee carelessness is connected to major data breaches that exposed customer information, according to a study by IT security firm Check Point.

With the risk of employees causing data breaches of customer and corporate information, employers should consider potential problem areas that could leave sensitive details vulnerable.

Here are five employee behaviors that could cause data breaches.

1. Browsing on social media

Social media may be most dangerous for cybersecurity. About 36 percent of respondents log into their work computers to look at social media sites, according to a survey by GFI Software/Opinion Matters. While browsing through a friend’s post online looks harmless, massive data breaches in the past have been caused by social engineering attacks.

2. Shopping online

The same GFI Software survey said about one-third of all respondents used their work computers for online shopping. Since online retailers store financial information, cyberattackers may target those sites to steal information through unsecured connections and look for unencrypted information. People browsing on the Internet for purchases might also click on a link to a malware-infected site or suspicious websites requesting their credentials.

3. Downloading games on business devices

Although there are tons of games available online, many of these apps might be malware in disguise. Fake games were a major source of malware infections, especially on third-party app stores that are not equipped to scan for malicious software, Forbes reported.

4. Uploading corporate documents with unsafe connections

With more employees spread out in different branches, hubs and more, online collaboration has increased in importance. Employees often upload corporate documents to share and get input from their colleagues. However, when these connections or websites are not completely safe, cybercriminals could get their hands on this information. Firms should ensure workers use Wi-Fi connections that are absolutely secure.

5. Not telling the IT department of threats

While companies may or may not have policies that require employees to use their business devices only for work, there are things that go wrong that may remain unreported. IT security professionals may be unaware of malware or other threats on mobile devices because workers failed to raise the alarm, which could leave threats undetected.

While these five activities are dangerous for businesses, they can also be risky for consumers, too. The same malware that you download to your work computer you can just as easily download to your personal computer or smartphone. Be sure you’re doing everything to protect your identity.

Monitoring your financial accounts and credit are the first line of defense. You can get your credit reports for free once a year under federal law. You can also check your credit scores for free on Credit.com to monitor for any sudden, unexpected changes that may signal your personal data has been used by fraudsters to open accounts.

More on Credit.com:

Get smarter with your money!

Want the best money-news and tips to help you make more and spend less? Then sign up for the free Money Talks Newsletter to receive daily updates of personal finance news and advice, delivered straight to your inbox. Sign up for our free newsletter today.