{"id":277,"date":"2017-10-16T10:40:21","date_gmt":"2017-10-16T10:40:21","guid":{"rendered":"https:\/\/hotlineit.launchmedigital.com\/?p=277"},"modified":"2018-12-04T08:54:58","modified_gmt":"2018-12-04T08:54:58","slug":"it-risk-management-examples","status":"publish","type":"post","link":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/","title":{"rendered":"IT Risks You Might Not Be Aware Of"},"content":{"rendered":"

Some Common IT Risk Management Examples<\/h2>\n

There are many myths among the IT industry that need to be discredited. Unfortunately, it is very common to see a workplace turn a blind eye to their technology\u2019s security. This occurs due to laziness, naivety or an insufficient technology budget that is unable to cover cybersecurity. It is important to keep the following common it risk management examples in mind:<\/p>\n

Laptops are just as, if not more vulnerable to security breaches as tablets and mobiles<\/h2>\n

Laptops and desktops in the office are not necessarily more secure than mobile devices. This is due to many laptops and desktops still containing resident hard drives that store complex data. This creates greater risk of stolen, compromised or illegally shared data.<\/p>\n

Public app stores are not always safe<\/h2>\n

Smaller companies often operate without their own network infrastructures for downloads. Therefore, they will sometimes use public app stores instead. These app stores have taken precautions to ensure the safety and security whilst downloading – but that does not guarantee the complete absence of security breaches, hacks and malware threats. The best policy is to create your own download procedures that your network administrator directly oversees.<\/p>\n

Desktop PCs and laptops can get lost<\/h2>\n

People do lose their Laptops and desktops, although not at the same rates as mobile devices. Five years ago, lost laptops were costing organisations $18 billion annually and the problem still exists today. All businesses should track equipment with asset management software and other measures, just as they track lost or misplaced mobile devices.<\/p>\n

Mac Software is still at risk of Viruses and Malware<\/h2>\n

Many are under the belief that Mac users are not susceptible to malware and viruses. The software is definitely more secure than Windows, however it can still be affected by malware. Xagent, OSX\/Pirrit, MacDownloader and Fruitfly are all examples of groups that have previously hacked mac devices for different reasons. Although anti-virus software is not imperative on mac devices, sometimes Apple is unable to respond to threats quickly enough. We strongly recommend downloading an anti-virus app.<\/p>\n

Everyone is vulnerable when operating technology and being aware of this is imperative. Knowing who and what is at risk is a vital part of keeping an organisation safe from hackers and thieves. Hopefully some of these common IT risk management examples will shine some light on potential issues in your workplace. If your business does not have an IT department and you are unsure of what risks you are facing, contact Hotline IT<\/a> or call +612 9451 9111<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Some Common IT Risk Management Examples There are many myths among the IT industry that need to be discredited. Unfortunately, it is very common to see a workplace turn a blind eye to their technology\u2019s security. This occurs due to laziness, naivety or an insufficient technology budget that is unable to cover cybersecurity. It is … Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":693,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[6],"tags":[],"acf":[],"yoast_head":"\nIT Risk Management Examples | Common IT Problems | Hotline IT<\/title>\n<meta name=\"description\" content=\"Hotline IT takes you through some of the throniest IT Risk Management Examples and offers solutions for many of the most Common IT Problems in Business\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Risk Management Examples | Common IT Problems | Hotline IT\" \/>\n<meta property=\"og:description\" content=\"Hotline IT takes you through some of the throniest IT Risk Management Examples and offers solutions for many of the most Common IT Problems in Business\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/\" \/>\n<meta property=\"og:site_name\" content=\"Hotline IT\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-16T10:40:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-04T08:54:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hotline IT Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hotline IT Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/\"},\"author\":{\"name\":\"Hotline IT Staff\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c\"},\"headline\":\"IT Risks You Might Not Be Aware Of\",\"datePublished\":\"2017-10-16T10:40:21+00:00\",\"dateModified\":\"2018-12-04T08:54:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/\"},\"wordCount\":429,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg\",\"articleSection\":[\"IT Risks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/\",\"url\":\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/\",\"name\":\"IT Risk Management Examples | Common IT Problems | Hotline IT\",\"isPartOf\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg\",\"datePublished\":\"2017-10-16T10:40:21+00:00\",\"dateModified\":\"2018-12-04T08:54:58+00:00\",\"description\":\"Hotline IT takes you through some of the throniest IT Risk Management Examples and offers solutions for many of the most Common IT Problems in Business\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#primaryimage\",\"url\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg\",\"contentUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg\",\"width\":880,\"height\":600,\"caption\":\"IT risks we should be aware of\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.hotlineit.com\/#website\",\"url\":\"https:\/\/staging.hotlineit.com\/\",\"name\":\"Hotline IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.hotlineit.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.hotlineit.com\/#organization\",\"name\":\"Hotline IT\",\"url\":\"https:\/\/staging.hotlineit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg\",\"contentUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg\",\"width\":1,\"height\":1,\"caption\":\"Hotline IT\"},\"image\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c\",\"name\":\"Hotline IT Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g\",\"caption\":\"Hotline IT Staff\"},\"url\":\"https:\/\/staging.hotlineit.com\/author\/hotline-it-staff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Risk Management Examples | Common IT Problems | Hotline IT","description":"Hotline IT takes you through some of the throniest IT Risk Management Examples and offers solutions for many of the most Common IT Problems in Business","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"IT Risk Management Examples | Common IT Problems | Hotline IT","og_description":"Hotline IT takes you through some of the throniest IT Risk Management Examples and offers solutions for many of the most Common IT Problems in Business","og_url":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/","og_site_name":"Hotline IT","article_published_time":"2017-10-16T10:40:21+00:00","article_modified_time":"2018-12-04T08:54:58+00:00","og_image":[{"width":880,"height":600,"url":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg","type":"image\/jpeg"}],"author":"Hotline IT Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hotline IT Staff","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#article","isPartOf":{"@id":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/"},"author":{"name":"Hotline IT Staff","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c"},"headline":"IT Risks You Might Not Be Aware Of","datePublished":"2017-10-16T10:40:21+00:00","dateModified":"2018-12-04T08:54:58+00:00","mainEntityOfPage":{"@id":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/"},"wordCount":429,"commentCount":0,"publisher":{"@id":"https:\/\/staging.hotlineit.com\/#organization"},"image":{"@id":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg","articleSection":["IT Risks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/","url":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/","name":"IT Risk Management Examples | Common IT Problems | Hotline IT","isPartOf":{"@id":"https:\/\/staging.hotlineit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#primaryimage"},"image":{"@id":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg","datePublished":"2017-10-16T10:40:21+00:00","dateModified":"2018-12-04T08:54:58+00:00","description":"Hotline IT takes you through some of the throniest IT Risk Management Examples and offers solutions for many of the most Common IT Problems in Business","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.hotlineit.com\/it-risk-management-examples\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.hotlineit.com\/it-risk-management-examples\/#primaryimage","url":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg","contentUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/06\/IT-risks-we-should-be-aware-of.jpg","width":880,"height":600,"caption":"IT risks we should be aware of"},{"@type":"WebSite","@id":"https:\/\/staging.hotlineit.com\/#website","url":"https:\/\/staging.hotlineit.com\/","name":"Hotline IT","description":"","publisher":{"@id":"https:\/\/staging.hotlineit.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.hotlineit.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/staging.hotlineit.com\/#organization","name":"Hotline IT","url":"https:\/\/staging.hotlineit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/","url":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg","contentUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg","width":1,"height":1,"caption":"Hotline IT"},"image":{"@id":"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c","name":"Hotline IT Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g","caption":"Hotline IT Staff"},"url":"https:\/\/staging.hotlineit.com\/author\/hotline-it-staff\/"}]}},"_links":{"self":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/posts\/277"}],"collection":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/comments?post=277"}],"version-history":[{"count":0,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/posts\/277\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/media\/693"}],"wp:attachment":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/media?parent=277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/categories?post=277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/tags?post=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}