Human Error Leading Source of Data Breaches

Human Error Leading Source of Data Breaches

There are many factors which can erode PC performance and privacy, and it’s important for users to remain vigilant to all the potential causes of compromised systems. However, it is most often users themselves that are the source of data breaches, as poor practices and a lack of awareness contribute to gaps in security through which hackers can infiltrate PCs and business networks.

Human errors and computer system glitches were behind 64 percent of all data breaches in 2012, according to a recent Ponemon Institute survey. The study, which included responses from 277 companies in nine countries, found that several subpar employee practices contributed to data breaches.

Research indicated that 62 percent of employees believed it was acceptable to transfer business information outside company networks, like to a home PC, with a majority never deleting it. The more networks that data can be found on and is transferred within, the more vulnerable it will be. Besides mishandled data, the survey also found that a dearth of system controls and direct policy violations were significant culprits of user error.

The survey found that the more regulated a business is, the higher its data breach costs. Breaches in sectors with strict security measures in place, like finance, healthcare and pharmaceutical cost 70 percent more than those in less policed industries. Extra costs in these industries stem from stopping and fixing the leak, lost data and new security measures to prevent future attacks from succeeding. The survey also reported substantial differences in cost that vary by geographic area. The countries with the highest average cost per data breach were the United States, with $5.4 million per breach, and Germany at $4.8 million. Companies in Brazil and India experienced the lowest cost per breach.

How to Protect Your PC
Not all data breaches can be attributed to user error. The survey also reported that system problems, like application failures, accidental data dumps, access control malfunctions and data recovery problems as contributors to compromised information. These issues are particularly thorny because they can rapidly affect many users or result in a security breach that goes unnoticed.

“While external attackers and their evolving methods pose a great threat to companies, the dangers associated with the insider threat can be equally destructive and insidious,” stated Ponemon Institute chairman Larry Ponemon.

There are several steps a company can take to shore up their defenses and prevent data breaches from happening. One step is to increase employee awareness of poor user practices through education and training. Organizations must eliminate user ignorance as a contributor to data leaks. Additionally, organizations should make sure to clean up computers in the office so that they’re at their most functional and up to date. Device management is an important part of shielding systems from potential complications that could stem from threatened data. Companies should take advantage of proactive security and optimization solutions like iolo’s System Mechanic Pro to improve the functionality and reliability of their networked devices.

System Mechanic Pro is an all-in-one security and PC performance solution that uses both signature-based reactive and behavior-based proactive detection strategies to build two lines of defense to stop known threats and build a general sense of whether a given file intends to harm your computer. In addition to the award-winning AV System Shield, System Mechanic Pro gives you the full suite of PC optimization tools found in System Mechanic.

Need a PC Mechanic?

Let our experts help you

LiveTech is our affordable, 24/7 premium technical support that can help you solve virtually any technology issue. Let our utility software experts help to remove malware; set up Amazon Echo/Alexa; optimize printers, modems, and routers; block browser popups and adware, and more.

Learn More

Available 24/7
People using laptop overhead view

What is iolo's Whole Home License?

The Whole Home License® is iolo’s licensing policy that allows you to install and keep your software running on all of your compatible devices within the same home. Previously, users were allowed to install and license their iolo software simultaneously on a maximum of three PCs. Under the Whole Home License, a single activation key allows you to use your iolo software on all of your PCs, other than any PCs you use for business purposes. What you need to know about Whole Home Licensing

  • You, your spouse, and your relatives living within the same household may use the same license on any number of PCs that you own which are not used for business.
  • For full legal terms and conditions, see https://www.iolo.com/company/legal/eula/

To install your iolo product on additional PCs:

  1. On the additional computer, download the latest version of your iolo product. Choose from the list of downloads offered here.
  2. Follow the steps in the installation wizard, and enter the same Activation Key that you used to install on your original computer.

You can view the Activation Key on the original computer from within System Mechanic > red menu bar > key icon > Activation Key.