Young employees have different attitudes to cyber crime • Blisstech Solutions

If you employ anyone aged between 16 and 19, you need to pay special attention to the cybersecurity training you’re giving your team.

A new study has revealed that a host of worrying online behaviour has become almost normalised among many young people. And much of this activity is illegal.

We’re not talking about serious cybercrime such as ransomware attacks or stealing data.

But one in three 16 to 19-year-olds have admitted to digital piracy, and a quarter has tracked or trolled someone online.

Most of these behaviours may not directly affect your business. But some are so commonplace that too many young people view them as a part of everyday life.

That’s not something you want them bringing to work.

Casual software piracy or illegal downloads on devices used for work could open the door to a massive security breach.

The answer is simple: Hold cybersecurity training for all your employees on a regular basis.

This training should:

  • Highlight the impact of bad online behaviour and the potential for security breaches
  • Help everyone understand how this kind of activity can harm people – and your business
  • Make everyone aware of the scams and attacks that your business is vulnerable to, as well as the part they play in keeping everyone protected
  • Make the consequences clear for anyone found to be engaging in this behaviour

If this is something you need some expert help with, it’s what we do so please get in touch.

Get In Touch

More Content

Browse with confidence: Microsoft Edge’s Enhanced Security

Microsoft is working on a major security update for its Edge browser, which will bring Edge enhanced security to everyone using it.

Cyber extortion: What is it and what’s the risk to your business?

Cyber extortion: What is it and what’s the risk to your business?

Have you heard of cyber extortion? It’s a very real threat to your business. Here we explain what it is and how to stay safe.

Microsoft plans a naming system for hackers

Microsoft plans a naming system for hackers

Hacking groups are given different names by different security companies. And that means you don’t know who’s really behind an attack so can’t react as quickly as you’d like. That’s about to change, thanks to Microsoft…

Can’t find what you need in Teams? This makeover will increase your business’s productivity

The Teams Fall 2024 update will increase your business’s productivity

The latest feature update in Teams is bringing a central notifications hub to keep things more organised. And a whole host of other useful features. We’ll tell you all about it here.

Tech Tip: How to find the tools you need in Microsoft Office

Welcome to a new Tuesday tech tip video, and it's another speedy, but useful one Are you struggling to find the tools you need in Office applications? Me too! Since Microsoft introduced the ribbon in Office applications, it has become harder to find tools that you...
New phishing scam is smarter than ever… here’s how to protect your business

New Microsoft 365 phishing scam is smarter than ever… here’s how to protect your business

Microsoft is warning business owners that trusted cloud storage services are being hijacked to trick you into handing over your data. Here we tell you what you need to know.

Windows 11 uptake is at an all-time high – what are you waiting for?

Windows 11 uptake is at an all-time high – what are you waiting for?

If you’re still attached to Windows 10, now’s the right time to upgrade. Here’s why…

Unwrap the gift of knowledge: 5 free AI courses by Microsoft

Unwrap the gift of knowledge: 5 free AI training courses by Microsoft

Microsoft has a little business-boosting gift that you won’t want to miss out on… five free courses about AI. We have the details, and the links to the courses.

Shady character in a mask sitting by computer screens

A new zero-day vulnerability in Windows

Introduction A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document,...

Are you really downloading Zoom – or is it malware?

When you think about tools for remote working and chatting online, one of the first names in your mind is Zoom. But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data. Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed […]

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05