Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Security Challenged by Users Who Break Rules

Two new surveys separately shine a light on a security issue technology can’t easily patch – users who don’t follow the rules. 

Two new surveys separately shine a light on a security issue technology can’t easily patch – users who don’t follow the rules. 

According to findings by security vendor BeyondTrust, 28 percent of employees admitted putting their digital hands on data not relevant to their job. The survey fielded responses from 265 IT decision makers, including security managers and network and systems engineers across a number of industries.

According to the findings, nearly one-quarter identified financial reports as the data accessed. Of particular interest to those employees were salary details, HR data and personnel documents. For the most part (80 percent), respondents felt that it was at least “somewhat likely” that access sensitive or confidential out of simple curiosity.

“Allowing any employee unfettered access to non-essential company data is both unnecessary and dangerous and should be an issue that is resolved quickly,” said Brad Hibbert, EVP of product strategy at BeyondTrust, in a statement.

This type of questionable behavior by users can also be seen when it comes to the bring-your-own device trend. In a survey of 3,200 mobile device owners between the ages of 21 to 32 working full-time, Fortinet discovered that 51 percent stated they would contravene any policy in place banning the use of personal devices at work or for work purposes. The survey also found that 14 percent of the respondents would not tell an employer if a personal device they used for work became compromised.

Advertisement. Scroll to continue reading.

Besides getting around BYOD policies, many participants also had a similar attitude towards using the cloud. Thirty-six percent of respondents using their own personal cloud storage like DropBox accounts for work purposes said they would break any rules brought in to stop them – something with problematic implications potentially because 33 percent of those that use cloud storage services store customer data there, while 22 percent store critical private documents like contracts and business plans.

“It’s worrying to see policy contravention so high and so sharply on the rise, as well as the high instances of Generation Y users being victims of cybercrime,” said John Maddison, vice president of marketing for Fortinet, in a statement. “On the positive side, however, 88 percent of the respondents accept that they have an obligation to understand the security risks posed by using their own devices. Educating employees on the threat landscape and its possible impact is another key aspect for ensuring an organization’s IT security.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.