For a hacker, stealing your data is easy. Most users and companies make it painless for criminals to plunder valuable information. You might think your files aren’t that important but your business competitors might think otherwise.

Picture this:

An electrician walks through your front door and says he’s got a work order to replace some wiring. It could be legit or it could be fake, at least he’s through the front door. Then he pretends to do some work while he waits for lunch time. When most people leave their desks around noon, he wanders through cubicle land looking for an unlocked computer…. and Bingo!!! He’s got your data! He can now sell it to the highest bidder, delete it, falsify it, leak it. The possibilities are endless.

Too easy you say? Fair enough. Most companies monitor this and have preventative measures against this sort of intrusion. If we are talking about a multinational company with bio scanners at every door, then you’d be right. But what about the small/medium size companies?

How often have you gone into a doctor or law office where the receptionist left the front desk computer unlocked/unattended? How often have you heard a friend say: “I use the same password for everything.” Even worse is when you find that password stuck to a monitor on a post-it note.

People often think of hackers as international spies jumping out of buildings, infiltrating laser guarded government facilities, etc.… The reality is a lot simpler than that. It could be that charming lady sitting in front of you at the park, winking at you while she steals your credit card information. How about your angry neighbor connected to your wireless router deleting your family pictures while you are blissfully unaware and you have no backup copies.

The fact is: Stealing data is easy. It’s easier to steal than candy from a baby. At least the baby would cry to alert their mom. If you aren’t careful it can happen to you or your business. Endless countermeasures can be implemented but if you have one weak link they are all pointless. If that password is written on a post-it note, may the gods have mercy on your soul.

This is where educating your users becomes the key ingredient in the enterprise cyber security recipe. It’s a given that you cannot always trust everyone to do the right thing. However, you can at least prevent most intrusions by establishing best security practices and eliminating the weakest links.

Here are some tips to help users. Some are common sense. You’d be surprised how often some of them are overlooked:

Data is precious. Protect it.