Contact Us
Blog March 5, 2019

6 Bad IT Security Habits You Need to Kick in 2019

As I write this, it’s early March, and the wind is howling outside my window. We’ve just had several days of subzero weather. Caught in the grip of another Polar Vortex, New Year’s Resolutions, to live healthily, are a distant memory for many of us.

But while the cold weather may thwart our efforts to be healthier, that doesn’t mean you can’t improve the health of your IT organization before spring. Here are 6 bad habits that can compromise your IT security.

1 Not admitting you need help

Too many IT leaders refuse to admit that they don’t know what they don’t know. This can be a relatively harmless habit, but not when it comes to IT security. Let’s say you’re migrating a workload to the cloud. If you don’t have an expert guiding your migration, you could be leaving workloads vulnerable.

2 Not keeping an eye on things

Do you have someone actively monitoring your systems for signs of a cyber-intruder? The thirteenth annual Cost a Data Breach Survey by the Ponemon Institute, the average time to identification was 197 days. A lot of damage can be done in six and a half months!

3 Ignoring the humans

In 2018, cybersecurity giant Symantec reported that phishing was by far the most used attack vector (71 percent) followed by a watering hole website (24 percent). You can implement the most sophisticated cybersecurity tools available, but if you don’t educate your employees on the dangers of clicking on unknown links, you’re leaving the door wide open.

4 Not revoking credentials

Regulations such as PCI 8.1.3 require you to immediately revoke system log-in credentials when an employee leaves the business for any reason. Yet, the internet is filled with anecdotes from people who say they could access their former employer’s (or client’s) systems months after they’ve left.

5 Silo thinking

We all know that silo-thinking is a problem for the organization as a whole. Yet, it is still rampant in many large IT organizations. One of the best examples is IT security and disaster recovery. The larger the organization, the more likely these two vital areas will be led by different people. However, in the most recent Cost a Data Breach Survey available from the Ponemon Institute, cyberattacks were the second leading cause of unplanned outages (22 percent). IT security and Disaster Recovery teams need to collaborate to protect the organization.

6 Putting up with jerks

It’s more than a cliché. IT Security roles often attract people who struggle with human interaction. They can come across as anything from rude to arrogant, and without necessarily meaning to, they can make your non-experts feel stupid. IT security requires open communication and collaboration across many departments. You need to make it clear you won’t put up with poor behavior whether it’s coming from an internal employee or an outside vendor.

You could be less than 21 days from a stronger IT environment

Need help? Give us a call. say it takes about 21 days for a new and better behavior to become a habit. You can overcome all of these bad IT habits within that timeframe – sometimes even less. Our experts would love to discuss your IT security strategy and help you create a personalized plan for improving your IT security health.

Related Resources

4 Use Cases for Connectria’s Hybrid Cloud
Connectria’s Hybrid Cloud brings the unique capabilities of IBM Power Systems to our data centers in close proximity to AWS in US-East and US-West. This…
Black Friday and Cyber Monday: IT’s Ultimate Stress-Test
It’s that time of year again! With Black Friday and Cyber Monday quickly approaching, retailers are gearing up for the 2021 holiday shopping season. While it’s…
Hybrid Cloud DR Connectivity for IBM i and AIX
We recently shared a new diagram for IBM on-net with AWS hybrid cloud. In this article, I will discuss connectivity into Connectria’s hybrid cloud data…