Young employees have different attitudes to cyber crime • Blisstech Solutions

If you employ anyone aged between 16 and 19, you need to pay special attention to the cybersecurity training you’re giving your team.

A new study has revealed that a host of worrying online behaviour has become almost normalised among many young people. And much of this activity is illegal.

We’re not talking about serious cybercrime such as ransomware attacks or stealing data.

But one in three 16 to 19-year-olds have admitted to digital piracy, and a quarter has tracked or trolled someone online.

Most of these behaviours may not directly affect your business. But some are so commonplace that too many young people view them as a part of everyday life.

That’s not something you want them bringing to work.

Casual software piracy or illegal downloads on devices used for work could open the door to a massive security breach.

The answer is simple: Hold cybersecurity training for all your employees on a regular basis.

This training should:

  • Highlight the impact of bad online behaviour and the potential for security breaches
  • Help everyone understand how this kind of activity can harm people – and your business
  • Make everyone aware of the scams and attacks that your business is vulnerable to, as well as the part they play in keeping everyone protected
  • Make the consequences clear for anyone found to be engaging in this behaviour

If this is something you need some expert help with, it’s what we do so please get in touch.

Get In Touch

More Content

3 things you should do now to protect your business email

It's a fact, most cyber attacks start with an email.  In fact, a frightening 91% of attacks begin with someone clicking on something they shouldn't in an email they received. Here are three things you can do now to protect your business and make it harder for...

Here’s how cyber criminals try to hack your accounts while you sleep

Have you ever received a notification on your phone while you’re sleeping, asking if it’s really you logging in?
It’s called a fatigue attack and Microsoft Authenticator’s latest feature will help to protect you.

The Microsoft sign on a building

Microsoft urge users to patch against critical vulnerability

Microsoft is warning of a recently discovered critical Windows DNS Server vulnerability that is described as “wormable”. DNS (Domain Name Services) is used by computers all over the world to find each other. The Internet could not work without it. Microsoft DNS is...

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online What is Phishing? Phishing is a common online scam in which cybercriminals try to trick you into sharing personal information, such as passwords and credit card numbers. Phishers often use email or...

Cut the Jargon! The top 3 things you should discuss with your IT partner

IT support involves technical tasks, and the language used in this field can be quite technical at times. Therefore, we have created a plain language guide that focuses on the three key areas you should discuss with your technology partner. Contact us if you want to...
WAIT sign on British road crossing

How to delay Windows 10 updates

It is an undisputed fact that, to keep your computer secure, you should keep the software running on it up to date.  We go on about it again and again and again.  However, there is a balance between making sure that you have the latest Windows 10 updates, and also...
Man with magnifying glass

Cyber Essentials: A Guide to CE and its Benefits

Many people have heard of Cyber Essentials (CE), but do you know what it is and what benefits it can bring to your business? This article will discuss what cyber essentials is and how it can help your business and the role that a Cyber Essentials assessor plays in...

Tech Tip: Capture Your Screen Like a Pro – Essential Screenshot Techniques for Windows

Welcome to a new Tuesday tech tip video where I will show you how to take screenshots in Windows. Screenshots are an indispensable tool for anyone who uses a computer. They allow us to capture specific areas of our screen, share instructions, document errors, or...
How to configure multiple profiles in Outlook thumbnail

Tech Tip: How to create multiple Outlook profiles

Happy Tuesday everyone! Today's Tech Tip is a tip on how to create multiple Outlook profiles. Is your email playing up with Outlook occasionally crashing or hanging for no apparent reason? OR Maybe you have multiple email accounts configured in Outlook and things are...
A person in a hoodie surrounded by green cipher text

3 Things You Must Do to Protect Against Ransomware

Ransomware is an increasingly common and devastating cyberattack that can happen to any business. The ransomware attacks that get the most media attention are those on high profile companies, but ransomware attacks on small businesses are increasing too. Many smaller...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2023 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05