Research Finds Only a Quarter of Employees Bypass Security Policies

According to new research from Webroot, an Internet security service company, only about 25 percent of employees have tried to bypass company security policies while at work, while nearly all (95 percent) respect the importance of their employer's measures for protecting their network and customer information.

"It is a pleasant surprise to learn that employees understand the need for increased security and abide by corporate policy," said Jacques Erasmus, chief information security officer for Webroot. "That said, employees at all levels still introduce risk to a corporate network through activities like surfing the web, shopping online, planning personal events and accessing personal email accounts while at work. As we see more and more malware being spread through the browser, such as Zeus and SpyEye which infects users' computers to track their keystrokes and steal their banking information, it is vitally important for companies to put in place suitable web security solutions and develop effective and secure web security policies to help protect their organisation."

Surveying more than 2,500 employees in the United States, United Kingdom and Australia, Webroot also found that executive or senior management staff performed non-work related activities during work at a higher rate than their subordinates. For example, 41 percent of executives reported planning personal events such as vacations, weddings or parties while on the clock, while just 35 percent of regular, full-time employees reported doing similar activities.

Additional Findings:

Employees feel security policies at work are very necessary:
·      95 percent agree that compliance with their employer's security policies is important;
·      83 percent consider protection of customer information and data as a benefit;
·      89 percent believe security policies help with the prevention of infections or viruses on the company network;
·      Few employees (seven percent) expressed extreme concern that employers monitor their online activities;
·      Nearly two-thirds (61 percent) reported that their employers' security policies never or rarely make it more difficult for them to do their jobs;
·      75 percent believe security policies are a necessary evil.


UK employers were also seen to impose more security policies than employers from the United States or Australia:
·      Login password for company computers: 90 percent in the UK vs. 84 percent overall;
·      Program download restrictions: 62 percent vs. 55 percent overall;
·      Restrictions on accessing network outside of the office: 46 percent vs. 37 percent overall;
·      Two-factor authentication for network or computer access: 28 percent vs. 20 percent overall.

Of those who skirt around corporate security policies, younger employees (those aged 18 to 29) reported a higher incidence of doing so:
·      15 percent used a mobile device to do activities not allowed at work vs. 6 percent overall;
·      12 percent accessed prohibited sites from a mobile device vs. 5 percent overall;
·      6 percent manipulated browser settings vs. 3 percent overall.

Employees learn from their coworkers' mistakes:
·      26 percent of respondents were aware of someone who received a warning as a result of breaking security policies;
·      18 percent were aware of someone who was fired;
·      9 percent someone whose computer privileges were reduced;
·      8 percent someone who was put on probation.

While all employees use company-owned devices to do non-work activities at work, executive and senior management seem to do more than other staff:
·      Purchased non-work related items online: 48 percent vs. 42 percent overall;
·      Personal event planning: 41 percent vs. 35 percent overall;
·      Instant messenger use: 17 percent vs. 12 percent overall;
·      Moved files using an online backup service: 12 percent vs. 7 percent overall.

For companies wishing to implement a web usage policy to protect itself and its staff, Webroot security experts recommend the following actions:

·      Define your security policies - With a new generation of web-based attacks, spyware, adware and webmail-borne viruses, it's more important than ever to develop well-thought-out and clearly defined web security policies.

·      Embrace social media - Social networks are new mediums for digital threats to an organisation. Build these into your policy and implement a set of rules that enables employees to harness all the benefits of these new technologies while protecting your business.

·      Clearly communicate policies - When rolling out new web security policies through an organisation, it is important to communicate these new policies to all the staff for better adherence to the policy. And regularly communicate with staff about IT and security issues.

·      Block threats before they reach your network - Roll out a cloud-based web security service that allows you to protect mobile employees as if they were at the office, while monitoring and enforcing your web security policies.

Webroot Research gathered this data between June 29 and through July 4, 2011, through the use of an online survey of full-time and part-time employees who use a computer at work in the United States, United Kingdom and Australia. With a total of 2,508 respondents the margin of error is ±2.0 percentage points at the 95 percent confidence level.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3