Data-Deposit-Box-DataDepositBox-Online-Backup-Cloud-Data-Remote-Backup

Only a Quarter of Employees Bypass Security Policies: Webroot Research

Report finds top brass spend more time than their employees planning personal activities

BROOMFIELD, Colo., Sept. 20, 2011 — /BackupReview.info/ — According to new research from Webroot, the first Internet security service company, only about 25 percent of employees have tried to bypass company security policies while at work, while nearly all (95 percent) respect the importance of their employer’s measures for protecting their network and customer information.

“It is a pleasant surprise to learn that employees understand the need for increased security and abide by corporate policy,” said Jacques Erasmus, chief information security officer for Webroot. “That said, employees at all levels still introduce risk to a corporate network through activities like surfing the web, shopping online, planning personal events and accessing personal email accounts while at work. As we see more and more malware being spread through the browser, such as Zeus and SpyEye which infects users’ computers to track their keystrokes and steal their banking information, it is vitally important for companies to put in place suitable web security solutions and develop effective and secure web security policies to help protect their organisation.”

Surveying more than 2,500 employees in the United States, United Kingdom and Australia, Webroot also found that executive or senior management staff performed non-work related activities during work at a higher rate than their subordinates. For example, 41 percent of executives reported planning personal events such as vacations, weddings or parties while on the clock, while just 35 percent of regular, full-time employees reported doing similar activities.

Additional Findings:

Employees feel security policies at work are very necessary:

  • 95 percent agree that compliance with their employer’s security policies is important;
  • 83 percent consider protection of customer information and data as a benefit;
  • 89 percent believe security policies help with the prevention of infections or viruses on the company network;
  • Few employees (seven percent) expressed extreme concern that employers monitor their online activities;
  • Nearly two-thirds (61 percent) reported that their employers’ security policies never or rarely make it more difficult for them to do their jobs;
  • 75 percent believe security policies are a necessary evil.

UK employers were also seen to impose more security policies than employers from the United States or Australia:

  • Login password for company computers: 90 percent in the UK vs. 84 percent overall;
  • Program download restrictions: 62 percent vs. 55 percent overall;
  • Restrictions on accessing network outside of the office: 46 percent vs. 37 percent overall;
  • Two-factor authentication for network or computer access: 28 percent vs. 20 percent overall.

Of those who skirt around corporate security policies, younger employees (those aged 18 to 29) reported a higher incidence of doing so:

  • 15 percent used a mobile device to do activities not allowed at work vs. 6 percent overall;
  • 12 percent accessed prohibited sites from a mobile device vs. 5 percent overall;
  • 6 percent manipulated browser settings vs. 3 percent overall.

Employees learn from their coworkers’ mistakes:

  • 26 percent of respondents were aware of someone who received a warning as a result of breaking security policies;
  • 18 percent were aware of someone who was fired;
  • 9 percent someone whose computer privileges were reduced;
  • 8 percent someone who was put on probation.

While all employees use company-owned devices to do non-work activities at work, executive and senior management seem to do more than other staff:

  • Purchased non-work related items online: 48 percent vs. 42 percent overall;
  • Personal event planning: 41 percent vs. 35 percent overall;
  • Instant messenger use: 17 percent vs. 12 percent overall;
  • Moved files using an online backup service: 12 percent vs. 7 percent overall.

What should organizations do?
For companies wishing to implement a web usage policy to protect itself and its staff, Webroot security experts recommend the following actions:

  • Define your security policies – With a new generation of web-based attacks, spyware, adware and webmailborne viruses, it’s more important than ever to develop well-thought-out and clearly defined web security policies.
  • Embrace social media – Social networks are new mediums for digital threats to an organisation. Build these into your policy and implement a set of rules that enables employees to harness all the benefits of these new technologies while protecting your business.
  • Clearly communicate policies – When rolling out new web security policies through an organisation, it is important to communicate these new policies to all the staff for better adherence to the policy. And regularly communicate with staff about IT and security issues.
  • Block threats before they reach your network – Roll out a cloud-based web security service that allows you to protect mobile employees as if they were at the office, while monitoring and enforcing your web security policies.

About the Research
Between June 29 and through July 4, 2011, Webroot conducted an online survey of full-time and part-time employees who use a computer at work in the United States, United Kingdom and Australia. With a total of 2,508 respondents the margin of error is ±2.0 percentage points at the 95 percent confidence level. Country-level margins of error are:

  • Australia: ±4.2 points (555 respondents)
  • United Kingdom: ±3.3 points (910 respondents)
  • United States: ±3.0 points (1.038 respondents)

About Webroot
Webroot is a leading provider of Internet security services for consumers and businesses worldwide. Founded in 1997, privately held Webroot is headquartered in Colorado and employs approximately 450 people globally in operations across North America, Europe and the Asia Pacific region. Consistently rated among the best security offerings available, Webroot’s products include endpoint, web and mobile security services. The company has expanded its cloud security portfolio with the recent acquisitions of BrightCloud and Prevx, pioneers in behavior-based malware detection. For more information, visit http://www.webroot.com or call 800.772.9383.

Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

©2011 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark or trademark of Webroot Software, Inc. in the United States and other countries. All other trademarks are properties of their respective owners.

SOURCE: Webroot

Like us on Facebook




===========================
Do you like this post? Subscribe to our RSS feed ===========================

Sponsored Links:

Data Deposit Box

Asigra

Bacula Systems


Cloud-based-Online-Backup-Disaster-Recovery-Data-Storage-by-Bacula-Systems-in-Switzerland

Share/Save/Bookmark

Related posts:

  1. Webroot Unveils Webroot Internet Security Complete, Identity Management, Secure Access, And Online Storage, While Protected By The Cloud Anytime, Anywhere
  2. Carbonite, Online Data Backup Specialist, Names Senior Executives to Lead Small Business and Consumer Units, Product Management and Customer Service
  3. Webroot Marketing Director George Anderson to Present at DattoCon
  4. SugarSync, Online Data Backup, Sync and Sharing Provider, and Webroot Partner to Deliver Secure Cloud Services to Consumers
  5. Webroot Research: One Year Later, Social Networkers Are Savvier About Keeping Information Private, But Still Take Risks
  6. 65 Percent of Kaspersky Lab Survey Participants Say Bring Your Own Device is a Business Security Risk
  7. Latest Webroot Solutions Provide Superior Security Without Compromise, Including Secure Online Backup and File Sync
  8. Acronis Survey Shows Nearly 60 Percent of Companies are Vulnerable to BYOD Risks
  9. Survey: 94 percent of Small Businesses Use or Plan to Use Tape Cartridges as Part of a Hybrid Solution for Data Backup
  10. Atera Partners with Webroot to Deliver the Next Generation of Security Solutions

Tags: