Risk
12/14/2007
12:51 PM
Commentary
Commentary
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Office Workers Know About Your Security Policy. But Are They Following It?

Hey IT managers, your office workers might say they are following security procedures. But get someone to ask them that question anonymously. Their answers might surprise -- and upset -- you.

Hey IT managers, your office workers might say they are following security procedures. But get someone to ask them that question anonymously. Their answers might surprise -- and upset -- you.RSA, the security division of EMC, recently published a survey tantalizingly titled, "The Confessions Survey," thanks to the way the research was conducted, in on-the-street interviews, providing its respondents with anonymity. About a third of the respondents were from small to midsize companies.

According to eWeek, "53 percent of respondents who work for the private sector access work e-mail via a public computer such as at an Internet caf, airport kiosk, hotel or the like."

Moreover, "sixty-eight percent of enterprise workers leave work carrying a mobile devicesuch as a laptop, smart phone or USB flash drivethat holds sensitive job-related information, including customer data, Social Security numbers or company financials."

The kicker is that in response to the survey question: Are you familiar with the IT security policies of your company?, a full 81 percent of business workers answered yes. Furthermore 69 percent of business workers answered yes to the question: Does your company follow training about the importance of following security best practices?

InformationWeek's John Soat flips the percentage and focuses on the 31 percent of those companies that do not provide the necessary training on the significance of following their security practices. While that is almost a third, it doesn't account for all those employees who are familiar with their company's security policies, know about their importance, and continue to flout those rules.

Perhaps that can be explained in the employees' answer to this question in the survey: "Do you ever feel the need to work around your company's established security policies and procedures just to get your job done?" A full 35 percent of business workers said yes.

Obviously security policies need to be implemented and enforced in small and midsize businesses but Soat's quote from RSA acknowledges that there is also a working reality and calls on IT managers to take that into account when establishing security policies:

"Organizations can mitigate this risk by developing information-centric policies that acknowledge and align with the needs and realities of the business. Once such policies are in place, companies should constantly measure actual user behavior against established policy and use what they learn to inform smart policy changes that minimize risk and maximize business productivity. When security is as convenient as possible for end users, they are less likely to work around security policy."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.