Research Finds Only a Quarter of Employees Bypass Security Policies

According to new research from Webroot, an Internet security service company, only about 25 percent of employees have tried to bypass company security policies while at work, while nearly all (95 percent) respect the importance of their employer's measures for protecting their network and customer information.

"It is a pleasant surprise to learn that employees understand the need for increased security and abide by corporate policy," said Jacques Erasmus, chief information security officer for Webroot. "That said, employees at all levels still introduce risk to a corporate network through activities like surfing the web, shopping online, planning personal events and accessing personal email accounts while at work. As we see more and more malware being spread through the browser, such as Zeus and SpyEye which infects users' computers to track their keystrokes and steal their banking information, it is vitally important for companies to put in place suitable web security solutions and develop effective and secure web security policies to help protect their organisation."

Surveying more than 2,500 employees in the United States, United Kingdom and Australia, Webroot also found that executive or senior management staff performed non-work related activities during work at a higher rate than their subordinates. For example, 41 percent of executives reported planning personal events such as vacations, weddings or parties while on the clock, while just 35 percent of regular, full-time employees reported doing similar activities.

Additional Findings:

Employees feel security policies at work are very necessary:
·      95 percent agree that compliance with their employer's security policies is important;
·      83 percent consider protection of customer information and data as a benefit;
·      89 percent believe security policies help with the prevention of infections or viruses on the company network;
·      Few employees (seven percent) expressed extreme concern that employers monitor their online activities;
·      Nearly two-thirds (61 percent) reported that their employers' security policies never or rarely make it more difficult for them to do their jobs;
·      75 percent believe security policies are a necessary evil.


UK employers were also seen to impose more security policies than employers from the United States or Australia:
·      Login password for company computers: 90 percent in the UK vs. 84 percent overall;
·      Program download restrictions: 62 percent vs. 55 percent overall;
·      Restrictions on accessing network outside of the office: 46 percent vs. 37 percent overall;
·      Two-factor authentication for network or computer access: 28 percent vs. 20 percent overall.

Of those who skirt around corporate security policies, younger employees (those aged 18 to 29) reported a higher incidence of doing so:
·      15 percent used a mobile device to do activities not allowed at work vs. 6 percent overall;
·      12 percent accessed prohibited sites from a mobile device vs. 5 percent overall;
·      6 percent manipulated browser settings vs. 3 percent overall.

Employees learn from their coworkers' mistakes:
·      26 percent of respondents were aware of someone who received a warning as a result of breaking security policies;
·      18 percent were aware of someone who was fired;
·      9 percent someone whose computer privileges were reduced;
·      8 percent someone who was put on probation.

While all employees use company-owned devices to do non-work activities at work, executive and senior management seem to do more than other staff:
·      Purchased non-work related items online: 48 percent vs. 42 percent overall;
·      Personal event planning: 41 percent vs. 35 percent overall;
·      Instant messenger use: 17 percent vs. 12 percent overall;
·      Moved files using an online backup service: 12 percent vs. 7 percent overall.

For companies wishing to implement a web usage policy to protect itself and its staff, Webroot security experts recommend the following actions:

·      Define your security policies - With a new generation of web-based attacks, spyware, adware and webmail-borne viruses, it's more important than ever to develop well-thought-out and clearly defined web security policies.

·      Embrace social media - Social networks are new mediums for digital threats to an organisation. Build these into your policy and implement a set of rules that enables employees to harness all the benefits of these new technologies while protecting your business.

·      Clearly communicate policies - When rolling out new web security policies through an organisation, it is important to communicate these new policies to all the staff for better adherence to the policy. And regularly communicate with staff about IT and security issues.

·      Block threats before they reach your network - Roll out a cloud-based web security service that allows you to protect mobile employees as if they were at the office, while monitoring and enforcing your web security policies.

Webroot Research gathered this data between June 29 and through July 4, 2011, through the use of an online survey of full-time and part-time employees who use a computer at work in the United States, United Kingdom and Australia. With a total of 2,508 respondents the margin of error is ±2.0 percentage points at the 95 percent confidence level.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.