Study: Employees engage in risky computing

Common employee behavior may result in data loss or leakage of a company's intellectual property, according to a study from Cisco.

The study, called “The Challenge of Data Leakage for Businesses and Employees Around the World,” examined 2,000 employees and IT professionals from 10 countries — the United States, United Kingdom, France, Germany, Italy, Japan, China, India, Australia, and Brazil.

 

The research discovered that despite the security policies, procedures, and tools currently in place, employees around the world are engaging in risky behaviors that put corporate and personal data at risk,” the report states.

 

The behaviors include using unauthorized applications on business networks, altering security settings and sharing work devices and sensitive information with non-employees.

 

The study said that employees alter security settings to perform non-work related tasks such as paying bills online, downloading music, looking at pornography or gambling online, which can pose, “serious threats to corporate security and profitability.”

 

Mobile employees pose a threat, too. More than 75 percent of employees said they do not use a privacy guard when working remotely in a public place, the report states.

 

The study also suggests ways companies can prevent data leakage. Recommendations include knowing and managing data well, institutionalizing standard codes for secure conduct, fostering a culture of openness and trust and establishing security awareness education.

 

Sign up to our newsletters

More in News

Bitcoin mining botnet has become one of the most prevalent cyber threats

Fortinet researchers have tracked 100,000 new ZeroAccess trojan infections per week, making the botnet very lucrative to its owners.

House Intelligence Committee OKs amended version of controversial CISPA

House Intelligence Committee OKs amended version of controversial ...

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

Judge rules hospital can ask ISP for help ...

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.