Are you using Teams to share sensitive data?

Microsoft Teams has fast become one of THE most useful business tools for the way we work today.

No matter where your people work from, they can communicate and collaborate quickly and reliably.

But this remote way of working can also open the door to some MAJOR security issues.

New research shows that nearly HALF of employees frequently share confidential and sensitive files via Teams.

That can be a big problem if employees are using personal equipment rather than company issued kit… it’s simply not as secure as work devices.

More than half of people surveyed say they’ve shared ‘business critical’ information using personal devices. Worse still, 48% admitted they’ve accidentally sent files they shouldn’t have – possibly to the wrong person!

So how can you be sure that your people are using Teams in the safest, most secure way?

The solution lies with regular training and cyber security awareness for employees at all levels of your business – from trainee to CEO.

And you need to make sure you have all the right safeguards in place to protect your sensitive business data. Because if it fell into the wrong hands, the results could be an expensive nightmare, potentially with legal consequences. Just imagine if sensitive employee information got shared outside of the business…

Remember, even a trusted app like Teams is only as safe as the people who use it and the devices it’s installed on.

If you need help with cyber security training, or putting the right protections in place, get in touch.

Published with permission from Your Tech Updates.

Share this article with your friends...

Facebook
Twitter
LinkedIn
WhatsApp
Email

Get Started With StormWarden

Getting started is easy.  Get in touch with us today.

Read More

Related Articles

Free A stylish and contemporary home office setup with laptop and desk accessories. Stock Photo

Our devices are a big part of our daily lives: work, fun, and staying in touch. Still, sometimes they make us less

closeup photo of turned-on blue and white laptop computer

It can be challenging to keep up with the ever-evolving cyber threat landscape. Companies need to process large amounts of data. As

Free mail phishing scam vector

Have you been hearing more about email authentication lately? There is a reason for that. It’s the prevalence of phishing as a