{"id":52288,"date":"2021-11-17T23:16:46","date_gmt":"2021-11-17T19:16:46","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=52288"},"modified":"2025-11-21T13:47:51","modified_gmt":"2025-11-21T09:47:51","slug":"9-worst-cybersecurity-practices","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/9-worst-cybersecurity-practices\/","title":{"rendered":"9 Worst Cybersecurity Practices"},"content":{"rendered":"<p>At least once in your life, you've been cyberpwned. Also, chances are that you know exactly what triggered the successful attack. <!--more--><\/p>\n<p>In the modern world, we all know the best cybersecurity practices. In theory. But it's the worst practices that cause all the problems. And sometimes, even the best of the best, the IT pros, tend to forget what you should <em>not<\/em> do.<br \/>\nIn this article, we will discuss the worst cybersecurity practices you might have seen, practiced, or been hit for.<\/p>\n<h2>Bad Practice #1: \u201dIt Won't Happen to Me\u201d<\/h2>\n<p>Nobody likes to think about possible bad things happening in their lives. These are troubling thoughts that don't make your life easier, and nobody says that life is easy in the first place. But how does that habit turn out to be one of the worst cybersecurity practices?<\/p>\n<p>You see, your network is under constant attack. Malefactors seek loopholes, there are bots that search for open ports, and dozens of phishing emails are sent to you and your end users daily.<br \/>\nAnd the chances that at least one of these attacks will be successful are alarmingly high. At this point, some might say that such attacks are aimed exclusively at enterprise-grade businesses, and \u201dIt won't happen to my small company.\u201d However, such an opinion is a big mistake.<\/p>\n<p>Yes, cybercriminals are aiming for enterprise-grade companies for the enterprise-grade ransom. But they typically face enterprise-grade cybersecurity policies and tech. When we talk about small and medium-sized companies, yes, the average amount of ransom paid is probably smaller, but the chances that smaller companies will have thorough cyber-protection are also significantly lower.<\/p>\n<p>According to <a href=\"https:\/\/thehighcourt.co\/ransomware-statistics\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Purplesec<\/a>, 44% of small businesses were hit by ransomware at least once in previous years, and 48% were hit multiple times. And about 70% of small businesses are not protected well enough against cyberattacks.<\/p>\n<p>So why exactly does this \u201dit won't happen to us\u201d thought emerge? It's because of the expected expenses and the complexity of adopting thorough cybersecurity solutions. Yes, it's expensive and you won't have budgeted for the full-on SIEM suite and an additional security engineer. And then comes the complexity factor. You need to audit, fix, maintain, manage, and set up, and do this regularly.<\/p>\n<p>In the end, most people tend to start thinking, \u201dWell, it's too expensive and complex for us. And after all, attacks are aimed at enterprises.\u201d<\/p>\n<h2>Bad Practice #2: Being Careless About Recent Attacks<\/h2>\n<p>So, you've been breached. You have successfully recovered and fixed the consequences. Some tend to think that this will be enough, since you've recovered. Not so. At this point, what you should do is to perform a security audit to find and fix the flaws in your network that made the attack possible.<\/p>\n<p>On the other hand, you shouldn\u2019t be ignorant about the attacks happening to others. Check out the news and determine whether there are new attack patterns that you can learn from to protect your infrastructure.<\/p>\n<h2>Bad Practice #3: Staying Basic<\/h2>\n<p>Attacks evolve and the malefactors are using new ways to sneak through your defenses each year. And the cybersecurity market has answers to this. New tools and approaches emerge, not to mention the new complex platforms that can defend your infrastructure as a whole.<\/p>\n<p>So what you really shouldn't do is stay with the same \u201dgood old\u201d apps that you've been using for ages.<\/p>\n<h2>Bad Practice #4: Poor Password Security Rules<\/h2>\n<p>Your password policy is the first frontier for most attacks aimed at your network, your email services, and your cloud applications. As soon as you start thinking, \u201dI\u2019ll use \u2019123456admin\u2019 as the password here, since no one will ever try to intrude into this service,\u201d you're laying yourself open to an upcoming disaster.<\/p>\n<p>Also, there are two more worst <a href=\"https:\/\/www.msp360.com\/resources\/blog\/password-security-comprehensive-guide\/\">password security<\/a> practices that you should be aware of:<\/p>\n<ul>\n<li><strong>Let your users choose their passwords<\/strong>. Believe it or not, no user will choose a really safe password. It will be their dog\u2019s name 9 times out of 10.<\/li>\n<li><strong>Grant your users admin access<\/strong>. Some tech people tend to give their user administrator access while troubleshooting, and then forget about it. That's not a security loophole, it\u2019s a security nightmare \u2013 a great opportunity to intrude into your whole network through your user's machine.<\/li>\n<\/ul>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP's Educational Posters on Password Security<\/div>\n<div class=\"call-to-action__text\">\n<p>The poster pack includes:<\/p>\n<ul>\n<li>Best practices for creating strong passwords<\/li>\n<li>Reminders on how secure passwords should look like<\/li>\n<li>A chart to check if your password is secure enough<\/li>\n<\/ul>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-88fb277b-8296-40db-9698-b362eb68ccaa\" data-portal=\"5442029\" data-id=\"88fb277b-8296-40db-9698-b362eb68ccaa\"><span class=\"hs-cta-node hs-cta-88fb277b-8296-40db-9698-b362eb68ccaa\" id=\"hs-cta-88fb277b-8296-40db-9698-b362eb68ccaa\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/88fb277b-8296-40db-9698-b362eb68ccaa\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-88fb277b-8296-40db-9698-b362eb68ccaa\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/88fb277b-8296-40db-9698-b362eb68ccaa.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 40%;\"><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/04\/MSPs-Educational-Posters-on-Password-Security.png\" alt=\"Whitepaper icon\" \/><\/div>\n<\/div>\n<h2>Bad Practice #5: No Proper Documentation<\/h2>\n<p>Once your passwords are secure and strong, your network is well protected, and your applications are up-to-date, it's time to up-level your security policies. You should create proper documentation, including your incident response plans and postmortems of recent incidents.<\/p>\n<p>The reason for this is simple. Ask yourself, do you have an <a href=\"https:\/\/www.msp360.com\/resources\/blog\/designing-a-ransomware-response-plan\/\">action plan against a successful ransomware intrusion<\/a>? And do your end users know how to act if they notice such an intrusion, and whom to notify? If you have a well-documented and acknowledged incident response plan, and your employees and tech staffers are trained in accordance with it, only then you will be able to notice the attack in time and minimize its consequences.<\/p>\n<h2>Bad Practice #6: Mindless Adoption of New Technology<\/h2>\n<p>Some CEOs and CTOs tend to follow every technological trend on the market. And sometimes this makes your network, infrastructure, and application portfolio a chaotic and unmanageable mess. You will face dozens of integrations, a lot of interconnected security rules, and more passwords for the end users than you can safely manage.<\/p>\n<p>All that raises the number of possible attack vectors. Don\u2019t get me wrong, though; you should not be afraid of new technology. Most times it\u2019s essential when you need to up-level your company\u2019s operational potential. It\u2019s adopting it without a proper plan in the first place that makes things uncontrollable.<\/p>\n<h2>Bad Practice #7: No Audits or Assessments<\/h2>\n<p>Nowadays, even when you are running a fairly small organization, you are managing at least a dozen interconnected cloud and local applications, and network services. Not to mention that after the pandemic there is a strong culture of working from home, which means that your resources are decentralized.<\/p>\n<p>Thus, you are either overattentive to what happens to your network, or you \u201dset it and forget it\u201d, until some lucky malefactor finds a hole in your infrastructure and uses it.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/it-security-audit-guide\/\">IT Security Audit: A Comprehensive Guide<\/a><\/p>\n<h2>Bad Practice #8: No Security Awareness Training in Place<\/h2>\n<p>Some say, \u201dIt's always DNS,\u201d when their network is down. Others say, \u201cIt's always end users,\u201d when an attack happens. Both these parties are right, at least to some extent.<\/p>\n<p>Many attacks are aimed at end users in the hope that they lack training. There are different types of such attacks: <a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing\/\">phishing<\/a> and <a href=\"https:\/\/www.msp360.com\/resources\/blog\/spear-phishing-prevention\/\">spear-phishing<\/a> emails that are designed to fool people into downloading corrupted files; brute force attacks on weak passwords; and social engineering to discover the strong ones, to name just a few examples.<\/p>\n<p>And normal people focused on doing their jobs rather than on everyday cybersecurity training are simply not prepared for all this. So it's unfair to make fun of or be angry with users who fail to comply with standards and practices. They have no idea about such practices in the first place.<\/p>\n<p>Without proper education and regular training, your users will be the biggest glaring hole in your cybersecurity. Although experienced system administrators know that, even with proper training, most users tend to forget things and mix them up, at least some of them will pay attention to the emails they open next time.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-are-you-talking-to-customers-about-ransomware\/\">Ransomware Awareness Training: How Are You Talking to Customers About Ransomware?<\/a><\/p>\n<h2>The Worst Practice: No Disaster Recovery<\/h2>\n<p id=\"last\">Building a production environment with no setup or tested backups is like jumping out of a plane with only one parachute. Nine times out of ten it will open, for sure, but the tenth jump won't be fun.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\" data-portal=\"5442029\" data-id=\"aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\"><span class=\"hs-cta-node hs-cta-aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\" id=\"hs-cta-aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/aa07fdb8-7776-46a5-9fa0-ec6e93f0f0a6.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>No matter how secure your network is or how good your users are in not downloading corrupted files, there are still chances of being hacked. And they are quite high, as you can see from the statistics above. Your <a href=\"https:\/\/www.msp360.com\/resources\/blog\/backup-vs-disaster-recovery\/\">backup and disaster recovery practices<\/a> are the last, the essential, line of defense in the cybersecurity world.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/disaster-recovery-plan-checklist\/\">Disaster Recovery Planning Checklist<\/a><\/p>\n<p>Imagine for a minute: What will happen if all your production data is crypto-locked and you cannot recover it from your backups. I think that at this point hundreds of thousands of dollars in losses and even possible bankruptcy are flashing before your eyes. And that's not an exaggeration; that's exactly how much losing your data could cost your company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At least once in your life, you&#8217;ve been cyberpwned. Also, chances are that you know exactly what triggered the successful attack.<\/p>\n","protected":false},"author":53,"featured_media":52299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[883,877,884,885],"tags":[],"class_list":["post-52288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup-and-dr-articles","category-blog-articles","category-msp-business-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/52288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=52288"}],"version-history":[{"count":16,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/52288\/revisions"}],"predecessor-version":[{"id":57003,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/52288\/revisions\/57003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/52299"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=52288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=52288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=52288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}