Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

7 corporate security no-nos

November 05, 2018

7 corporate security no-nos

With cybersecurity threats on the rise and growing in sophistication all the time, a first line of defense for your customers is to avoid the mistakes so many companies make.

The potential risks of not taking the proper precautions are considerable. A recent Ponemon Institute study found that the 505 enterprises surveyed experienced, on average, more than one cyberattack each month and spends about $3.5 million annually to deal with the consequences.

So, as your customers’ trusted IT advisor, you should remind them to avoid these errors:

  1. Not having a cybersecurity policy and recovery plan in place

    Companies need to establish clear guidelines and procedures for all employees to follow—and delineate measures to take should an incident occur.

  2. Failing to update antivirus signatures and security patches

    Another common problem is the failure to lock down system administrators’ accounts.

  3. Ignoring legacy systems

    Some companies are under the false assumption that legacy equipment can’t be hacked and doesn’t need security patches.

  4. Being too lax with network access privileges

    Verizon’s 2016 Data Breach Investigations Report found that access privilege abuse is the leading cause of data breaches in business.

  5. Failing to establish and enforce BYOD security policies

    A recent study found that 20% of the organizations surveyed suffered a mobile security breach, primarily driven by malware and malicious Wi-Fi networks—and that 37% of the companies had no plans to beef up their cybersecurity budgets for BYOD.

  6. Not educating employees on the cybersecurity basics

    Only 50% of companies surveyed currently make security training for new and existing employees a priority.

  7. Not consolidating networks properly after an acquisition

    Simply bolting an acquired network onto an existing one is fraught with risks.


Though, at first glance, all this may seem like common sense, you’d be surprised at how even obvious preventive measures like these can fall through the cracks. The statistics cited here show that companies, as a rule, can do a much better job of securing their valuable assets.

To learn more about helping your customers take the proper precautions, contact Ingram Micro’s David McClary