Is it tempting for your employees to casually perform work tasks with their personal accounts or devices? Make sure your organizations Information Security Policy is clearly defined and that your employees follow the policies security protocols and procedures.