Dangers of Distracted Driving

Distracted driving is any activity that could divert your attention away from the main task of driving.1 It is something that is both dangerous and disturbingly common. In fact, drivers spend more than half of their time focused on things other than driving.2 You may be surprised to learn that cell phones and texting are just part of the problem when it comes to distracted driving. While stowing your phone while you drive is an important safety step, other behaviors behind the wheel, from drinking coffee to using a navigation system, may also be putting you at risk.

“The fact is, everything that occupies your mind or your vision can contribute to distraction behind the wheel,” explains Chris Hayes, Safety Professional from Travelers. “While many distracted driving studies focus on cell phones, any type of multi-tasking activity and driving simply do not mix.”

A list of driving distractions may include:

  • Dialing or using a smartphone;
  • Texting;
  • Eating or drinking;
  • Talking to passengers;
  • Grooming;
  • Reading;
  • Programming a GPS or navigation system;
  • Adjusting a radio or MP3 player.

Cognitive Distraction

It may not be surprising to learn that your brain is only capable of processing a certain amount of information at any given time.

When we attempt to perform multiple tasks at the same time, like driving while talking on the phone or eating, we can encounter performance problems. Multiple tasks tend to compete for our brain’s attention.

Visual Distraction

It may sound like an assumed fact, but you have to look where you are going when driving. Regardless, we see people driving without looking where they are going every day. Driving while visually distracted can be as dangerous as driving with your eyes closed. You would not make a turn or change lanes with your eyes closed, yet, distracted drivers are, in effect, doing just that.

Imagine driving the length of a football field with your eyes closed. That is the equivalent of texting while driving at 55 mph. Because texting takes our attention away for an average of 4.6 seconds3, we are 23 times more likely to be involved in a crash.

Some other common distractions most of us are very familiar with include eating, adjusting music or GPS devices, applying makeup, reading, and reaching for moving objects. Each of these tasks can dramatically increase your odds of getting into an accident.

Texting while driving is particularly dangerous because it requires manual, visual and cognitive distraction at the same time, according to distraction.gov, the U.S. government’s official website on distracted driving.

Cognitive, Visual or Both?

Distraction can keep you from driving safely in multiple ways. Any distraction, regardless of how quick or harmless it may seem, should be avoided when you are behind the wheel. Remember to keep your eyes and brain focused on the road at all times.

Setting a Good Example

Avoiding sending text messages or calling someone you know is on the road can help prevent them from distraction. Parents can set a good example for children by modeling attentive driving, including putting away the phone and not eating or grooming behind the wheel. Learn more about talking to your teen driver.

Sources: 1 U.S. Department of Transportation, http://www.distraction.gov/stats-research-laws/facts-and-statistics.html. 2 AAA Foundation for Traffic Safety, https://www.aaafoundation.org/sites/default/files/DistractedDrivingBrochure.pdf. 3 Driver Distraction in Commercial Vehicle Operations, FMCSA, 2009.

5 Ways to Help Protect Your Company’s Data

A data breach could turn into a catastrophic event for any company, especially for small businesses that may not be prepared for this emerging threat. The 2015 Symantec Internet Security Threat Report found that 60% of all targeted attacks struck small- to mid-sized companies.1 As a business owner or an employee, there are a number of preventive steps you can take to help keep your company’s data secure. The most important place to start is to know the common causes of data breaches and how to avoid them before the damage is done.

You may think data breaches are mainly caused by outsiders hacking into the system. While that scenario is the one that makes headlines in the media, the fact is that employee error, such as a lost or stolen computer or mobile device, or downloading malicious software, can also lead to data loss or a data breach incident. Train your employees to better understand these risks to help protect your company’s data.

Following are some safety steps, including how to help protect your work space, stay safer when receiving email and create strong passwords.

  1. Protect Data at Your Work Space

If you step away from your desk while you are in the middle of a project that includes sensitive business information, take some precautions to protect company data from visitors or others who are not authorized to see that information. Remember these simple tips for keeping your work spaces secure:

  • When you step away from your computer, lock it up. You can also change your preferences to require your user account password when unlocking or waking up your computer.
  • After a meeting, clean up your materials.
  • After printing, copying or faxing, pick up your documents right away.
  • Keep sensitive documents in secure locations.
  • Always stay aware of your surroundings.
  1. Be Aware of Phishing Schemes

Phishing emails are fake email messages that can be used by criminals and hackers to target your credit and identity, gain control of your computer and network or steal your password and access company information. They often appear as if coming from a trusted source, such as your credit card company or another vendor, and can often include links or attachments that they ask you to download. You should delete suspicious emails without opening them.

Before you open an email or respond to any requests to download files or click on links, confirm that it:

  • Comes from someone you know.
  • Comes from someone who has sent you an email before.
  • Is something you were expecting.
  • Does not look odd, with unusual spelling or characters.
  1. Passwords: Longer is Stronger

Using strong passwords and changing them regularly makes it harder for thieves to access information. Never share your password with anyone. Choose something cryptic so it is difficult to guess, but it should also be memorable so you can avoid writing it down. If you do write it down, keep it in a locked cabinet or drawer.

Best practices for strong passwords include the following:

  • Passwords should not contain all or part of your name or ID.
  • Passwords should be at least seven characters long.
  • Passwords should contain characters from at least two of the following four categories: upper case letters, lower case letters, numbers and symbols (e.g., &, %, $, #).
  1. Stay On Guard While Traveling

Portable devices, including laptops, tablets and smartphones, can be easier to lose and a target for thieves. Be aware when logging in to secure systems in public places so others cannot see your username and password.

  • Keep your mobile device with you at all times while at the airport, on public transportation or in any public space, and never check it with your baggage.
  • When you travel by car with your laptop, put it in the trunk of the vehicle. Take it with you when you arrive at your final destination.
  • Never store your password or backups with your mobile devices.
  • When away from the office, keep your company laptop, mobile device and portable storage devices, such as flash drives, secure, either locked up or in your personal possession.
  1. Recognize Social Engineering

Much like piecing together a puzzle, social engineers get what they need by gathering pieces of information from many different sources, including your social profiles and other information about your organization. Since people may not be who they claim to be, always verify before providing any kind of information.

If someone you do not know claims to be a fellow employee, you can:

  • Try calling the person back at their work phone number.
  • Send a code word or number to his or her company email address and ask the person to call back with it.

Share these tips with others in your organization to help keep your company’s data safe. Learn more about cyber risks and how to create cyber security training for employees.

Sources: 1 Symantec Internet Security Threat Report, April 2015, Volume 20: https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-security-threat-report-volume-20-2015-social_v2.pdf