Research Finds Only a Quarter of Employees Bypass Security Policies

According to new research from Webroot, an Internet security service company, only about 25 percent of employees have tried to bypass company security policies while at work, while nearly all (95 percent) respect the importance of their employer's measures for protecting their network and customer information.

"It is a pleasant surprise to learn that employees understand the need for increased security and abide by corporate policy," said Jacques Erasmus, chief information security officer for Webroot. "That said, employees at all levels still introduce risk to a corporate network through activities like surfing the web, shopping online, planning personal events and accessing personal email accounts while at work. As we see more and more malware being spread through the browser, such as Zeus and SpyEye which infects users' computers to track their keystrokes and steal their banking information, it is vitally important for companies to put in place suitable web security solutions and develop effective and secure web security policies to help protect their organisation."

Surveying more than 2,500 employees in the United States, United Kingdom and Australia, Webroot also found that executive or senior management staff performed non-work related activities during work at a higher rate than their subordinates. For example, 41 percent of executives reported planning personal events such as vacations, weddings or parties while on the clock, while just 35 percent of regular, full-time employees reported doing similar activities.

Additional Findings:

Employees feel security policies at work are very necessary:
·      95 percent agree that compliance with their employer's security policies is important;
·      83 percent consider protection of customer information and data as a benefit;
·      89 percent believe security policies help with the prevention of infections or viruses on the company network;
·      Few employees (seven percent) expressed extreme concern that employers monitor their online activities;
·      Nearly two-thirds (61 percent) reported that their employers' security policies never or rarely make it more difficult for them to do their jobs;
·      75 percent believe security policies are a necessary evil.


UK employers were also seen to impose more security policies than employers from the United States or Australia:
·      Login password for company computers: 90 percent in the UK vs. 84 percent overall;
·      Program download restrictions: 62 percent vs. 55 percent overall;
·      Restrictions on accessing network outside of the office: 46 percent vs. 37 percent overall;
·      Two-factor authentication for network or computer access: 28 percent vs. 20 percent overall.

Of those who skirt around corporate security policies, younger employees (those aged 18 to 29) reported a higher incidence of doing so:
·      15 percent used a mobile device to do activities not allowed at work vs. 6 percent overall;
·      12 percent accessed prohibited sites from a mobile device vs. 5 percent overall;
·      6 percent manipulated browser settings vs. 3 percent overall.

Employees learn from their coworkers' mistakes:
·      26 percent of respondents were aware of someone who received a warning as a result of breaking security policies;
·      18 percent were aware of someone who was fired;
·      9 percent someone whose computer privileges were reduced;
·      8 percent someone who was put on probation.

While all employees use company-owned devices to do non-work activities at work, executive and senior management seem to do more than other staff:
·      Purchased non-work related items online: 48 percent vs. 42 percent overall;
·      Personal event planning: 41 percent vs. 35 percent overall;
·      Instant messenger use: 17 percent vs. 12 percent overall;
·      Moved files using an online backup service: 12 percent vs. 7 percent overall.

For companies wishing to implement a web usage policy to protect itself and its staff, Webroot security experts recommend the following actions:

·      Define your security policies - With a new generation of web-based attacks, spyware, adware and webmail-borne viruses, it's more important than ever to develop well-thought-out and clearly defined web security policies.

·      Embrace social media - Social networks are new mediums for digital threats to an organisation. Build these into your policy and implement a set of rules that enables employees to harness all the benefits of these new technologies while protecting your business.

·      Clearly communicate policies - When rolling out new web security policies through an organisation, it is important to communicate these new policies to all the staff for better adherence to the policy. And regularly communicate with staff about IT and security issues.

·      Block threats before they reach your network - Roll out a cloud-based web security service that allows you to protect mobile employees as if they were at the office, while monitoring and enforcing your web security policies.

Webroot Research gathered this data between June 29 and through July 4, 2011, through the use of an online survey of full-time and part-time employees who use a computer at work in the United States, United Kingdom and Australia. With a total of 2,508 respondents the margin of error is ±2.0 percentage points at the 95 percent confidence level.

Featured

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.