How To Keep Your Employees From Leaking Confidential Information

Back in 2014, Code Spaces was the target of a cyber heist. The company offered tools for source code management, but they didn’t have solid control over sensitive information — including their backups. One cyberattack later, and Code Spaces was out of business. The hacker had used some standard techniques, but the most effective was getting an unwitting Code Space employee to help — likely via a phishing attack.

When it comes to cybercrime that targets businesses, employees are the largest risks.

Sure, your IT guys and gals are trained to recognize phishing attempts, funky websites, and other things that just don’t seem right. But can you say the same thing about the people in reception, or the folks over in sales?

Sure, those employees might know that clicking on links or opening attachments in strange emails can cause issues. But attacks have become pretty sophisticated; cybercriminals can make it look like someone in your office is sending the email, even if the content looks funny.

It only takes a click to compromise the system. It also only takes a click to Google a funny-looking link or ask IT about a weird download you don’t recognize.

Just as you can’t trust people to be email-savvy, you also can’t trust them to come up with good passwords. It may sound so 2002, but plenty of people still use birthdays, pet names, or even “password” as their passcodes — or they meet the bare-minimum standards for required passcode complexity.

You bring in added complexity to remain secure once employees start working outside of your network.

It’s not always possible to keep them from working from home, or from a coffee shop on the road—and sometimes that’s what you want them to do! But it is possible to invest in security tools at many levels to mitigate your risks.

You also need to consider the possibility of a deliberate security compromise. It’s possible that Code Space’s demise was the result of malice, so let it be a warning to you as well!

Whenever an employee leaves the company for any reason, remove their accounts and access to your data. And make it clear to employees that this behavior is considered stealing, or worse, and will be treated as such in criminal and civil court.

You really have your work cut out for you, huh? Fortunately, it’s still possible to run a secure-enough company in today’s world. Keep an eye on your data and on your employees. And foster an open communication that allows you to spot potential — or developing — compromises as soon as possible.

That’s why we are ADAMANT that we have our security stack at each of our clients, and the network is configured with Security Best Practices so there are multiple layers of protection on the network.

That’s also why we insist on Cyber Security Training for our clients. Worry Free IT clients receive this as part of their agreement and many of our other clients have engaged us to create Security Trainings for their staff.

Your network security is only as strong as its weakest link, and this is often your staff.

To engage InTech to create a Cyber Security Training for your team, contact us at 724.235.8750 or email

Free Report: 7 Urgent Security Protections Every Business Should Have In Place NOW

This report will outline in plain, nontechnical English common mistakes that many small-business owners make with their computer network that cost them thousands in lost sales, productivity and computer repair bills, as well as providing an easy, proven way to reduce or completely eliminate the financial expense and frustration caused by these oversights.

Download your FREE copy today at or call our office at 724-235-8750

Shiny New Gadget Of The Month:
OctoGripper, the Octopus-Inspired Robotic Arm, Is Here

The animal kingdom is a reliable place to turn for mechanical inspiration. The German automation company Festo just made a robotic arm that takes its cue from an octopus. Meet the OctoGripper!

Festo figured it’s hard to beat the octopus’ flexibility. Built with a soft silicone structure that can be pneumatically controlled, the device bends inward to grip an item with two rows of suction cups. These create a vacuum, allowing the gripper to hold onto objects tightly while moving quickly — a common challenge in robotics.

This isn’t the only thing Festo is taking from nature. They want to see the OctoGripper incorporated into their BionicMotion Robot, which is inspired by an elephant’s trunk. These could work side by side with humans, perhaps speeding up work.

Or they could pair up with Boston Dynamics and start the best robotic zoo this side of “Horizon: Zero Dawn.”

Goal Setting Doesn’t Work (And Santa Claus May Not Exist)

When we were kids, we thought we could write down a list of everything we wanted and mail it to the North Pole. When we grew up, we realized there wasn’t really a big roly-poly guy who delivered presents. A real person had to earn the money, march through shopping malls, wrestle the presents home, wrap them up, and place them under the tree. But I think many people still believe in Santa Claus. Why else would they write down a list of wants on New Year’s Day, stick it in a drawer for the rest of the year, and wait around for their lives to change?

Sorry, but it’s time to grow up. Most people know how to write down goals, but few ever achieve them. Want to stop chasing rainbows, wishing on stars, and rubbing lamps, and instead achieve real results? This article will help you start.

WARNING: Achievement requires work, discipline, commitment, and maybe some heartache and a stiffened spine. If any of that makes you queasy, I invite you to continue reading.

The Cause of All Your Problems
— and the Solution

When I ask people what they want to improve in their lives, I hear things like, “I need to make more money,” or “My marriage is unhappy,” or “I need to lose weight.”

But these are simply symptoms or outcomes of the problem. The cause of the problem is you — and this is probably one of the most sobering understandings you can reach as you work toward your stated goals. Whatever it is you want to change, whether it’s your marriage, financial situation, or weight, you’ll never achieve lasting change until you change. Once you improve, everything else around you will improve.

In life, you don’t get what you want; you get in life what you are. The success you have in life correlates with your level of self-worth. But the human tendency is to engage in the study of effects, while giving little attention to causes.

I see this travesty play out every day. People complain about their terrible marriage, so they leave it. Oddly enough, they end up with similar problems in the next relationship. Why? Because they didn’t address the real problem. The same set of circumstances and patterns of behavior will create the same outcome. Some people go from diet plan to diet plan, losing weight and then gaining it all back. Why? Because the plan and the weight aren’t the issues or the solutions; they are effects, and the weight will ultimately meet them back where they are.

Wherever you are in life right now is your own doing — good or bad.

Darren Hardy is the visionary force behind SUCCESS magazine as the Founding Publisher and Editor, and is the New York Times and Wall Street Journal bestselling author of what has been called “the modern day Think and Grow Rich”: The Compound Effect—Jumpstart Your Income, Your Life, Your Success ( and the worldwide movement to onboard 10 million new entrepreneurs through his latest book The Entrepreneur Roller Coaster--Why Now is the Time to #JoinTheRide ( Access Darren: and get free daily mentoring:

“Don’t Gamble With Your IT”

Leia Shilobod trading war stories with Jay Ryerse of Carvir Cyber Security.

Our message this year is “Don’t Gamble With Your IT” and it can be applied at so many levels. When I was at an industry event last month, I linked up with my good friend Jay Ryerse, owner of Carvir, a managed IT security company to chat about just this thing.

Jay owned an IT company like mine before starting Carvir. We shared stories about how we keep our clients secure and horror stories about what happens when businesses make the WRONG choice.

Like when Jay’s former client, The Cumming Chamber of Commerce in Georgia, made a poor choice for their next IT Provider. It was all puppies, kittens and rainbows in the beginning, but when they tried to move away from the IT guy they had chosen, he held their email and data hostage until they paid for the remainder of their 3-year contract. They actually had to take LEGAL ACTION against this guy. And it was all over the news.

What many businesses don’t internalize is that you are giving the “keys to your kingdom” over to whoever you choose as an IT Provider.

When you chose your current IT Provider, did you just flip to the page where the PRICE was or did you do your due diligence on their internal security practices, use of best practices on networks they configure and maintain, how they document your network and the changes they make?

If you didn’t, maybe it’s time to go back and ask those questions.

To Your Continued Success,