Research Finds Only a Quarter of Employees Bypass Security Policies

According to new research from Webroot, an Internet security service company, only about 25 percent of employees have tried to bypass company security policies while at work, while nearly all (95 percent) respect the importance of their employer's measures for protecting their network and customer information.

"It is a pleasant surprise to learn that employees understand the need for increased security and abide by corporate policy," said Jacques Erasmus, chief information security officer for Webroot. "That said, employees at all levels still introduce risk to a corporate network through activities like surfing the web, shopping online, planning personal events and accessing personal email accounts while at work. As we see more and more malware being spread through the browser, such as Zeus and SpyEye which infects users' computers to track their keystrokes and steal their banking information, it is vitally important for companies to put in place suitable web security solutions and develop effective and secure web security policies to help protect their organisation."

Surveying more than 2,500 employees in the United States, United Kingdom and Australia, Webroot also found that executive or senior management staff performed non-work related activities during work at a higher rate than their subordinates. For example, 41 percent of executives reported planning personal events such as vacations, weddings or parties while on the clock, while just 35 percent of regular, full-time employees reported doing similar activities.

Additional Findings:

Employees feel security policies at work are very necessary:
·      95 percent agree that compliance with their employer's security policies is important;
·      83 percent consider protection of customer information and data as a benefit;
·      89 percent believe security policies help with the prevention of infections or viruses on the company network;
·      Few employees (seven percent) expressed extreme concern that employers monitor their online activities;
·      Nearly two-thirds (61 percent) reported that their employers' security policies never or rarely make it more difficult for them to do their jobs;
·      75 percent believe security policies are a necessary evil.


UK employers were also seen to impose more security policies than employers from the United States or Australia:
·      Login password for company computers: 90 percent in the UK vs. 84 percent overall;
·      Program download restrictions: 62 percent vs. 55 percent overall;
·      Restrictions on accessing network outside of the office: 46 percent vs. 37 percent overall;
·      Two-factor authentication for network or computer access: 28 percent vs. 20 percent overall.

Of those who skirt around corporate security policies, younger employees (those aged 18 to 29) reported a higher incidence of doing so:
·      15 percent used a mobile device to do activities not allowed at work vs. 6 percent overall;
·      12 percent accessed prohibited sites from a mobile device vs. 5 percent overall;
·      6 percent manipulated browser settings vs. 3 percent overall.

Employees learn from their coworkers' mistakes:
·      26 percent of respondents were aware of someone who received a warning as a result of breaking security policies;
·      18 percent were aware of someone who was fired;
·      9 percent someone whose computer privileges were reduced;
·      8 percent someone who was put on probation.

While all employees use company-owned devices to do non-work activities at work, executive and senior management seem to do more than other staff:
·      Purchased non-work related items online: 48 percent vs. 42 percent overall;
·      Personal event planning: 41 percent vs. 35 percent overall;
·      Instant messenger use: 17 percent vs. 12 percent overall;
·      Moved files using an online backup service: 12 percent vs. 7 percent overall.

For companies wishing to implement a web usage policy to protect itself and its staff, Webroot security experts recommend the following actions:

·      Define your security policies - With a new generation of web-based attacks, spyware, adware and webmail-borne viruses, it's more important than ever to develop well-thought-out and clearly defined web security policies.

·      Embrace social media - Social networks are new mediums for digital threats to an organisation. Build these into your policy and implement a set of rules that enables employees to harness all the benefits of these new technologies while protecting your business.

·      Clearly communicate policies - When rolling out new web security policies through an organisation, it is important to communicate these new policies to all the staff for better adherence to the policy. And regularly communicate with staff about IT and security issues.

·      Block threats before they reach your network - Roll out a cloud-based web security service that allows you to protect mobile employees as if they were at the office, while monitoring and enforcing your web security policies.

Webroot Research gathered this data between June 29 and through July 4, 2011, through the use of an online survey of full-time and part-time employees who use a computer at work in the United States, United Kingdom and Australia. With a total of 2,508 respondents the margin of error is ±2.0 percentage points at the 95 percent confidence level.

Featured

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.