Why is 47% of data leaks an employee error?
Many companies in Poznań invest fortunes in expensive software, forgetting the weakest link: the human. Data from 47 audits we conducted show that almost half of the incidents result from routine and lack of attention, not a hacker attack.
Why does routine kill security?
Most employees treat security procedures as an unnecessary addition to daily tasks. During an audit at a transport company in Greater Poland, we discovered that 83% of system passwords were written on sticky notes attached to monitors. Employees did this because 'it was faster', not realizing that everyone cleaning the office had access to key financial data.
We observe this phenomenon frequently in small and medium-sized enterprises. When a team has too much on its plate, security measures become a burden. At Idryleaks, we always repeat: transparency is the foundation of profit, but only when we protect access to information. If a process is too complicated, the employee will skip it – that's a fact you cannot argue with.

The costs of a mistake that no one talks about
The consequences of a data leak rarely end with a one-time penalty. Analysis of one of our clients from Q3 2023 showed that losing a confidential client list cost the company approximately 12,400 PLN in just one month. These were costs associated with the necessity of changing contracts, legal fees, and the loss of trust from two key contractors.
These aren't amounts that bankrupt a company in one day, but regular losses of this type slowly drain financial liquidity. Facts instead of promises – an employee error that sends an invoice to the wrong recipient is not just a mistake. It is a regulation violation that costs time and real money for every entrepreneur in our region.
47% of errors result from routine, not from a lack of desire to work.
How to secure a company without large investments
You don't have to buy expensive enterprise-class systems to drastically reduce risk. The first step is verifying permissions. During an audit at a production company near Poznań (November 2023), we determined that 12 employees had access to financial files they didn't even need for their work. Limiting this access took us only 4 hours.
Introducing a simple checklist when sending external documents is another cheap step. Our observations show that companies that implemented a 'double verification' rule for the recipient reduced the number of erroneous shipments by 31%. Data must be secure, and the simplest tools are often the most effective in daily practice.
Where to start changes in the team?
Education shouldn't resemble boring health and safety training. From our experience, short, concrete monthly meetings work best. We show employees real examples: what a real phishing email looks like and why '123456' is the worst password they can come up with.
If you want to check the security status of your company, start by analyzing who has access to what. We can conduct a quick review for you in 2 days. We check the facts and provide a clear action plan. Remember, it's better to spend a fraction of that amount on an audit than to pay later for cleaning up the consequences of a data leak.
Simple steps beat expensive software if people know what to do.


