Ignorer kommandoer på båndet
Gå til hovedindhold

The biggest information security threat comes from within


Ithis NNIT Security Insights article, we discuss how the biggest information security threats come from within the company, and what can be done to minimize the risk.

Employees’ unconscious actions are now considered to be the biggest information security threat*. If a threat occurs within the company it can, however, be alleviated.

Companies and public institutions are increasingly exposed to cyberattacks. Cyberattacks are becoming more and more advanced and can potentially cause operational breakdowns with significant financial consequences to follow. An increasing share of companies’ IT budgets are used to improve IT security through technical solutions and process implementations. Employee behavior is, however, neglected despite the fact that it typically constitutes the biggest exposure.


Why are employees the biggest threat?

With multiple devices connected to various online services, we constantly give consent, download and click without hesitation. But one accidental click is enough to open the door to hackers. When employees are increasingly exposed to security threats without being able to identify them, the risk of unintentionally opening the door to hackers increases.


Employees are key to avoiding cyberattacks

The biggest threat can be turned into a strong defense against cyberattacks by building strong IT security behavior. Investing in employee behavior is, therefore, important in alleviating the threat of cyberattacks.


How is good information security behavior achieved?

A clear and professional information security policy is the foundation of good information security behavior, but the strength of the foundation depends on the employees’ awareness of it. Management must carefully articulate the values, which employees collectively have to protect, and what is expected of them in doing so. In order to succeed, management must provide appropriate training supported by ongoing dialog addressing the following questions:


  • How can phishing and spam mails be identified?

  • When is a link secure?

  • What is a strong password?

  • Why should passwords not be used in multiple logins?

  • Why should passwords not be shared?

  • Why should a PC be locked when leaving it?

  • What are the risks of charging smartphones from a PC?

  • Which types of USB flash drives are safe to use?

  • Which apps can be safely downloaded on a work phone?

  • When should data be encrypted?

  • When is it safe to give consent in a pop-up?

  • What should be done in case of a cyber attack?

It is important that employees know the answers to these questions and many more and are able to incorporate them into their daily behavior. Behavioral change is, however, time-consuming and requires ongoing efforts.

We humans like to do the right thing and would like to protect the companies for which we work. Nevertheless, we often do what is easiest, which may entail increased exposure to information security risks. Our experience as consultants shows that an information security strategy has to focus on behavioral design in order to be successful. Organizations have to think: How to make it natural and easy to act securely? This can be achieved by using simple nudging solutions such as having a plug in the USB port, which has to be removed before plugging in.

With a clear direction and appropriate training, employees can become key to avoiding cyberattacks.


NNIT has consulted and provided services to several companies to improve information security behavior. Please contact us for more information.

*Cybercrime survey 2017, PwC


About NNIT Security Insights

NNIT Security Insights is a regular column where prominent NNIT IT security advisors share their thoughts on current and future IT security challenges and how to deal with them.

NNIT has its own Cyber Defense Center. If lightning strikes, we have the necessary competencies in-house to respond and assist. We have also developed a range of services that can help businesses to achieve the right level of security protection to protect the business from financial and reputational damage.

You are welcome to contact us at nnitcontact@nnit.com if you want to know more about how NNIT can help your business increase its information security level.




Helene Wulff Andersen+45 30778120HWFA@NNIT.comPrincipal Consultanthttps://www.linkedin.com/in/helenewulffandersen/Helene Wulff Andersen



Syv gode grunde til cloudhttp://www.nnit.dk/ArtiklerOgOfferings/Sider/Syv-gode-grunde-til-cloud.aspxSyv gode grunde til cloud
Lad data løfte lønsomheden i dine projekterhttp://www.nnit.dk/ArtiklerOgOfferings/Sider/Lad-data-løfte-lønsomheden-i-dine-projekter.aspxLad data løfte lønsomheden i dine projekter
Kopenhagen Fur sikrer bæredygtigheden med D365http://www.nnit.dk/ArtiklerOgOfferings/Sider/Kopenhagen-Fur.aspxKopenhagen Fur sikrer bæredygtigheden med D365
IT-afdelingens evne til at skabe resultater, er virksomhedens eksistensgrundlaghttp://www.nnit.dk/ArtiklerOgOfferings/Sider/IT-afdelingens-evne-til-at-skabe-resultater.aspxIT-afdelingens evne til at skabe resultater, er virksomhedens eksistensgrundlag
Hvad er Dynamics 365?http://www.nnit.dk/ArtiklerOgOfferings/Sider/Hvad-er-Dynamics-365.aspxHvad er Dynamics 365?
Når digital transformation forandrer markedet: Disrupt eller bliv disruptedhttp://www.nnit.dk/ArtiklerOgOfferings/Sider/Disrupt-eller-bliv-disrupted.aspxNår digital transformation forandrer markedet: Disrupt eller bliv disrupted
Digital transformation: Smid din forretning i skyen, og træd ind i den fjerde industrielle revolutionhttp://www.nnit.dk/ArtiklerOgOfferings/Sider/Digital-Transformation-smid-din-forretning-i-skyen.aspxDigital transformation: Smid din forretning i skyen, og træd ind i den fjerde industrielle revolution
Digital transformation-CEO'ens rolle i forandringhttp://www.nnit.dk/ArtiklerOgOfferings/Sider/Digital-transformation-CEO'ens-rolle-i-forandring.aspxDigital transformation-CEO'ens rolle i forandring
CIO’ens nye rolle- fra drift til strategihttp://www.nnit.dk/ArtiklerOgOfferings/Sider/CIO’ens-nye-rolle-Fra-drift-til-strategi.aspxCIO’ens nye rolle- fra drift til strategi
Når Big Data giver stærkere return on ERP investmenthttp://www.nnit.dk/ArtiklerOgOfferings/Sider/Big-Data-giver-stærkere-return-on-ERP-investment.aspxNår Big Data giver stærkere return on ERP investment