• News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
Saturday, December 20, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
  • News
  • Finance
  • StartUPs
  • TechTAINMENT
  • Guest Writer
  • Digital Assets
  • IndustryINFLUENCERS
  • Environment
  • Macro Monday
ADVERTISEMENT

Home » 5 Steps to take after employee information leakage

5 Steps to take after employee information leakage

Yinka Okeowo by Yinka Okeowo
January 18, 2022
in Security
Reading Time: 2 mins read
0

RelatedPosts

REPORT: Hackers Using AI‑Generated Websites as Attack Tools

REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

Nigeria Records 4,200 Weekly Cyberattacks Per Organisation as Africa Faces One of the World’s Highest Threat Levels

UBA
Advertisements

A recent Kaspersky Employee Wellbeing 2021 report unveils that while organisations regularly face employee data leakage, 36% of respondents from the META region prefer not to disclose these incidents publicly.

employee information leakage

At the same time, staff may lack basic cybersecurity knowledge to protect themselves as only 38% of businesses offer IT security training.

According to the report, lack of external knowledge about potential cybersecurity incidents is not usually mitigated by internal efforts.

According to the research, only 38% of organisations have already implemented security education and training to ensure that employees are provided with crucial information.

In addition, more than seven in ten (76%) of those companies have experienced at least one issue relating to the quality of these services.

This includes dissatisfaction with the high complexity of courses and a lack of support or expertise on the part of the training provider.

Employees that had not been provided with basic knowledge about the importance of protective measures, can’t be expected to follow the rules.

MTN New

In 2021, compliance of staff and dealing with insufficient end-user security culture is one of the top three biggest concerns for businesses when it comes to IT security – 38% of respondents cited it among the most alarming issues.

In practice, companies regularly face informational security infringements (50%), inappropriate IT resource use (53%), and improper sharing of data via mobile devices (50%).

Breach prevention requires concerted action by everyone who interacts with a corporate system and could be a potential target for attackers.

To better secure employees, companies should combine reliable protective measures with maintaining security awareness among their teams.

These include:

  1. Ensuring prompt patching and updating of software to prevent adversaries penetrating the system.
  2. Implementing high-grade encryption for sensitive data and enforcing strong credentials and multi-factor authentication.
  3. Using effective endpoint protection with threat detection and response capabilities to block access attempts, and managed protection services for efficient attack investigation and expert response.
  4. Minimising the number of people with access to crucial data. Breaches are more likely to occur in organisations where too many employees work with confidential and valuable information that can be sold or somehow used.
  5. Equipping your employees with the cybersecurity skills they need.

There is a need for the organisation to provide education that presents all the necessary and up-to-date information in an engaging format.

To save time and receive a quality service, companies should work with globally recognised providers that can ensure an efficient learning process.

0Shares

stanbic
Yinka Okeowo

Yinka Okeowo

Related Posts

AI-generated websites

REPORT: Hackers Using AI‑Generated Websites as Attack Tools

by Peter Oluka
December 17, 2025
0
0

Kaspersky has detected a malicious campaign, where attackers leverage AI-generated websites to distribute versions of the legitimate remote access tool...

Cybercriminals Using Popular Turkish, Arabic Books as Bait to Steal Personal Data

REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

by Peter Oluka
December 17, 2025
0
0

The Kaspersky Global Research & Analysis Team has uncovered a malware-as-a-service campaign targeting ebook readers across Turkey, Egypt, Bangladesh and...

Nigeria Hit by 4,200 Weekly Cyberattacks as Africa’s Threats Surge

Nigeria Records 4,200 Weekly Cyberattacks Per Organisation as Africa Faces One of the World’s Highest Threat Levels

by Joan Aimuengheuwa
December 16, 2025
0
0

The data places Nigeria at the centre of a continental problem.

Sophos MITRE ATT&CK Evaluations

Sophos XDR Delivers 100% Detection Coverage in the Latest MITRE ATT&CK Evaluation

by Destiny Eseaga
December 13, 2025
0
0

Sophos, a global leader of innovative security solutions for defeating cyberattacks, has announced its best-ever results in the MITRE ATT&CK...

Businesses Turn to Cyber Insurance as AI-Driven Attacks Surge in 2025

Businesses Turn to Cyber Insurance as AI-Driven Attacks Surge in 2025

by Joan Aimuengheuwa
December 10, 2025
0
0

The global cyber insurance market has reached $20.56 billion in 2025.

Technological Trends Reshaping International Production | State of Ransomware in Manufacturing and Production 2025

Sophos: Manufacturing Sector Sees Drop in Ransomware, But Spike in Data Theft

by Joan Aimuengheuwa
December 5, 2025
0
0

Quick Read: Manufacturing experienced a 40% encryption rate, reflecting stronger early detection Attackers escalated data theft and extortion to maintain...

Load More
Next Post

Joeboy hits 100 million streams on Boomplay

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

MTN New
UBA
Advertisements
  • About Us
  • Advertise
  • Careers
  • Contact Us

© 2025 TECHECONOMY.

No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • World
  • Politics
  • Business
  • Science
  • Tech
  • Entertainment
  • Lifestyle

© 2025 TECHECONOMY.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.