Employees' Everyday Behavior Puts Sensitive Business Information At Risk

 RSA recently announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in the spring and summer of 2008.

The survey polled 417 individuals -- including delegates at the RSA Conference -- who confessed to their work-related security behaviors and attitudes. The survey respondents work across a range of industries, with a heavy concentration within the financial and technology sectors. Almost half of the respondents' job functions were in information technology. During this era of well-publicized data breaches, the results indicate that even those who should know better are not exempt from the everyday behaviors that can trigger significant risk to sensitive business information.

Of the respondents polled:

  • 46 percent work in the financial services sector.
  • 20 percent work in the technology sector.
  • 46 percent are IT professionals.
  • 11 percent are executives.
  • 54 percent work in companies with more than 5,000 employees.

The results of the survey show that employees are well aware of the restrictions placed upon them by their corporate IT departments, yet many often work around these controls in order to get their jobs done in a convenient and timely manner.

Of all respondents polled:

  • 94 percent are familiar with their organizations' IT security policies, yet 53 percent have felt the need to work around IT security policies in order to get their work done.
  • In response to a separate question, 64 percent frequently or sometimes send work documents to their personal e-mail address in order to access and work on them from home.
  • At the U.S. event, this statistic decreased to 50 percent, but increased to 62 percent at the Mexico event and 71 percent at the Brazil event
  • 15 percent have held a door open for someone at work that they did not recognize
  • The Brazil event reported the best figures at 7 percent, followed by 16 percent at the Mexico event. By contrast, the results from the U.S. event revealed almost one in three insiders (31 percent) have let a stranger into their workplace.

When trusted insiders work around security policies, sensitive data can be exposed that places businesses and their customers -- often consumers -- at unnecessary risk. Organizations can greatly mitigate this risk by developing information-centric security policies that acknowledge and align with the needs and realities of the business. This can help guard the integrity and confidentiality of information throughout its lifecycle -- no matter where it moves, who accesses it or how it is used. In tandem, organizations should build-in more convenient, invisible, and layered security technologies that can reduce the factors that cause employees to break the rules and defeat their own company's security policies.

In a mobile world, the survey affirms that employees depend on remote access to corporate information when outside the office, whether at home or in public places.

Of all respondents polled:

  • 89 percent frequently or sometimes conduct business remotely over a virtual private network (VPN) or webmail.
  • 58 percent frequently or sometimes access their work e-mail via a public computer, and 65 percent frequently or sometimes access their work email via a public wireless hotspot.

Remote access to sensitive data requires stronger forms of authentication than a simple, static and vulnerable combination of a username and password. To help solve this problem, organizations can maintain the flexibility and convenience of remote access to VPNs and webmail by providing one-time passwords via a hardware token, or a software token that is easily accessible on mobile devices such as BlackBerry smartphones.

The survey findings show that, in order for employees to be most productive, information has to be free to move. However, employee mobility increases the collective responsibility of protecting the information that is carried outside of the organization.

Of the respondents polled:

  • One in 10 has lost a laptop, smartphone and/or USB flash drive with corporate information on it.
  • The Mexico event reported the highest incidence of exposed corporate data, with a staggering 29 percent of all respondents confirming that they had lost a laptop, smartphone and/or USB flash drive; the U.S. event had the lowest figures, at 5 percent.
  • 79 percent frequently or sometimes leave their workplace carrying a mobile device containing sensitive information related to their jobs, such as a laptop, smartphone and/or USB flash drive.

While mobility is essential to business agility, unprotected information -- wherever it is kept or stored -- increases risk. A policy-based approach to securing data helps to enable organizations to classify their sensitive data, discover that data across the enterprise, enforce controls, and report and audit to ensure compliance with policy.

"Data loss prevention is a key concern for those in charge of today's corporate networks and information assets. However, with the sheer portability of information that we have today, it is essential that that data is governed not by the whims and day-to-day actions of your employees, but rather by pre-determined policy and subsequent controls," said Tom Corn, vice president of data security at RSA. "In this way, organizations can prevent sensitive information from being written to a USB flash drive in the first place -- or at least mandate that it is encrypted."

Organizations are dynamic and individuals' roles often change within the organization - be it an employee's internal move to a different job function or an outside consultant who moves on after the completion of an engagement. However, the governance of the corporate network does not always stay in lockstep with these moves.

Of all respondents polled:

  • 43 percent had switched jobs internally and still had access to accounts/resources which they no longer needed.
  • The Mexico event reported the best results with 30 percent, followed by the Brazil event at 42 percent. However, at the U.S. event, one out of every two respondents (50 percent) still had access to unnecessary areas of their corporate systems.
  • 79 percent reported that their company employs temporary workers and/or contractors who require access to critical organizational information and systems.
  • 37 percent have stumbled into an area of their corporate network to which they believe they should not have had access.

Access to highly sensitive data should be granted only to those who need it, and in some job functions access to only very specific areas within the information infrastructure are necessary. Organizations can manage large numbers of users while enforcing a centralized role-based security policy that ensures compliance, protects enterprise resources from unauthorized access and makes it easier for legitimate users to do their jobs.

"The survey reveals that it is as important for businesses to diligently enforce information security controls and policies focused on protecting the everyday actions of well-meaning, innocent insiders as it is to enforce those designed to defend against those with malicious intent," said Christopher Young, senior vice president at RSA. "It remains clear that businesses need to take a layered approach to security to help mitigate the insider threat and keep data safe. As such, it is important for any organization to know who has access to your information; control access through policy; monitor for suspicious activity to verify user identities; create and enforce data security policies and controls; and transform real-time event data into actionable compliance and security intelligence."

Featured

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.