Every year, technology like smartphones and laptops are lost in taxis, coffeeshops and elsewhere. Any security plan that doesn’t account for these “user error” conditions, is going to have difficulty from the very start. Teach routines like places to search before leaving a location or create "rituals" around packing up and leaving. These will help remind people to look around them before leaving. Also, mobile device management like a log-in authentication could help minimize damages.
Sometimes laptops get stolen by people who want to sell them on Craigslist, but sometimes laptops get stolen by people who are trying to steal your data. These data-hungry attackers are often found in parking lots and coffee spots normally visited by high-value targets. Always be mindful about where your laptop is, as well as using the public Wi-Fi at your favorite coffee shop.
Hackers have created a trojan that makes exclusive use of USB devices in order to spread. As with most cyber-security practices, the first line of defense is changing user behavior. In order to defend against USB Trojans is to first make sure that anti-malware systems are Up-To-Date and aggressive. The second step is to make sure there is a procedure for randomly appearing USB sticks.
Phishing emails are fraudulent emails appearing to come from a legitimate business or enterprise. These messages usually link you to a fake website or may get you to provide private information that is later used to obtain your personal data. Be on the lookout. Educate yourself and your staff.