Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Employee Burnout is Putting Your Organization’s Security at Risk
  • Data Breach
  • Malware
  • Vulnerabilities

Employee Burnout is Putting Your Organization’s Security at Risk

5 years ago Tripwire Guest Authors
Employee Burnout is Putting Your Organization’s Security at Risk

Burnout is a health hazard in any high-stress workplace, especially in any industry where highly skilled professionals must tackle urgent demands at unpredictable intervals and where effective response is time-sensitive or even urgently needed.

Employee burnout is a security and business continuity issue. It directly impacts both an employee’s performance and the organization’s stability and resiliency.

In fast-paced environments, it can be difficult to tease out the symptoms of burnout under the best of times. And these are anything but the best of times. The personal pressures the pandemic places on all of us as individuals, the communication gaps that can arise from remote working as a security team member, the pressure of supporting a hybrid/remote worker population that likely includes security apathetic non-security team members and the “scan-demic” exploits and phishing campaigns to which user communities are more likely to fall victim all take a toll on security team members.

The effects can place such employees at risk of burnout…and this is how attackers can get in.

Teasing Out Potential Burnout

It can be difficult for even the best managers and team leads to determine when a reliable employee is suffering from burnout. Here are indicators to watch for:

  • Are tasks being handled within an expected and acceptable timeframe?
  • Has a normally good-natured person become either withdrawn, frustrated, more sensitive to and around others, quick to anger or more frequently out on sick days?
  • Do they react negatively or fail to react and engage when being given new assignments that would benefit from “in the game” exchanges of information and guidance?
  • Are email responses lagging?

It’s difficult for managers to determine the morale and mental status of remote team members, but especially now, it’s crucial for an effective manager to take the added time, effort and steps required to regularly check in with their employees.

If you suspect either burnout or heightened levels of stress (which can come through as hypervigilance), it’s important to be responsive.

How to Reduce the Occurrence of Burnout

For signs of burn-out, here are steps to consider taking:

  1. Time off: Help them overcome any level of guilt they may associate with taking time off – even if it’s just an extra day or afternoon. Be supportive as a manager, and assure your team members that it’s okay.
  2. Check in: As a manager, set up weekly one-on-one virtual meetings with your team members to help figure out what to prioritize and whether specific tasks would benefit from additional talent. Ask team members to make to-do lists and go over them together to make sure you’re on the same page with regard to priorities.
  3. Weekday downtime: Remind employees that time off should be just that. They should not be expected to look at and respond to emails when it’s not during work hours. In fact, they should be discouraged from doing so. More miscommunications (and most phishing attacks) tend to occur during off hours – late at night, weekends, etc. Let them know that they need to be awake before they check emails. Enjoy that first tea, cup of joe or other morning ritual. And definitely, they are not to open any emails during happy hour!
  4. Implement regular weekly “No Meetings” day: These are days where no meetings or calls are scheduled so that everyone can focus on their own to-do’s and catch up on anything that might have been put on the back burner. This really helps in lowering stress levels, and as icing on the cake, it also improves focus and attention dedicated to your projects.
  5. Make your security team’s job a bit easier by reminding non-security employees that they must follow strict security and communications hygiene. Examples:
  • Wi-fi passwords should be upwards of 50 characters in length.
  • Reinforce the importance of cybersecurity to all employees. Since most may still be working remotely or may likely do so in future, remind them that they each hold a key that can be used to take down the company through ransomware, phishing attacks, etc. – even if they’re not physically in the building or consider themselves a target. Everyone is a target.
  • Remind employees that they be smart and aware when using Bluetooth devices when out in public. Attackers lurk everywhere.
  • Be extremely careful about clicking links, especially on mobile devices, and double-check any incoming requests to click a link or share anything of value (whether a transfer of funds or a login credential) through a sender’s trusted second channels such as Slack, IM, text, etc.
  1. Don’t micromanage: Learn to trust your workers. When you micromanage, you are setting them up to get burnout.

Burnout is a serious problem, and the stakes have never been higher. If burnout is suspected, be there for them. It’s your job.


About the Author: Chloé Messdaghi is an InfoSec Advocate & Activist who strongly believes that information security is a humanitarian issue. Besides her passion to keep people safe and empowered online & offline, she is driven to fight for hacker rights. She is the VP of Strategy at Point3 Security, Founder of WeAreHackerz (formerly known as WomenHackerz) & the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine’s The Uncommon Journey, and runs the Hacker Book Club.

You can follow her on Twitter and check out her website here.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Employee Burnout is Putting Your Organization’s Security at Risk” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Encryption, Hacker, High Severity, Malware, Medium Severity, Phishing, Ransomware, TripWire, Vulnerability

Continue Reading

Previous Fileless Malware Tops Critical Endpoint Threats for 1H 2020
Next How CISOs Can Foster Effective Comms and Build a Cybersecurity Program

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

6 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

23 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

1 day ago [email protected] (The Hacker News)

Recent Posts

  • FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
  • Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
  • CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026
  • Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
  • Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT