Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

End Users Flout Enterprise Security Policies

Separate studies show many users understand rules, but they break them anyway

If end users really understood your organization's security policies, they would follow them, right?

Wrong, according to studies released separately today by two security vendors, RSA and SecureInfo. Though they targeted different audiences, both studies reach a common conclusion: Security "awareness" may not be enough to stop end users from engaging in risky behavior.

"We already know about users who create problems because they don't know the policy and about users who violate policies with malicious intent," says Sam Curry, vice president of product management and marketing at RSA. "What we're finding is that there is a third, growing group of users who knowingly violate security policy not to do something malicious, but because they are trying to get their jobs done. This sort of violation is innocent, but deliberate."

According the RSA study, about 35 percent of workers routinely make a conscious decision to break enterprise security policy because they want to expedite their work or increase their own productivity. Such users may choose to export sensitive data to their personal devices or access the company network via a poorly-secured public wireless hotspot, Curry observes.

"They're just trying to get their work done -- in their minds, the importance of the work outweighs the security concern," Curry says. "But the compromises that occur as a result can be just as damaging as if they didn't know the policy at all."

SecureInfo today released a similar study that asks some of the same questions of federal government employees. That study indicates that only about 20 percent of government workers follow prescribed security policies all of the time. Some 22 percent of respondents believe their government co-workers follow security policy less than half of the time.

These violations occurred despite the fact that 97 percent of the government employees polled had been required to take some sort of IT security awareness training during the year, SecureInfo said.

"The good news is government workers and their leadership understands the importance of information security," said Chris Fountain, CEO of SecureInfo. "The bad news is workers seem to lack an understanding of the critical role they play in protecting information assets. There needs to be more accountability across the government workforce."

But motivating employees to follow policy can be difficult, Curry notes. "A company basically has three motivational tools -- financial, social, and moral," he observes. "You can tie their behavior to their raises or financial incentives, but that can be difficult because you're essentially trying to prove a negative. You can encourage it socially, through peer pressure, or you can try to convince employees that morally, it's the right thing to do. All of those answers can be problematic."

SecureInfo's study indicates that only 48 percent of government workers who took the security awareness training were tested on what they learned, and only 33 percent said they remembered most of what they had been taught.

And despite awareness training efforts, many employees don't see security as their concern, according to the RSA study. While the majority of end users say employees share the responsibility for system security, a whopping 43 percent say computer security is solely an IT issue.

"What this says is that, in addition to awareness, there's a whole issue of risk that needs to be better understood, both by the company and by the employee," Curry says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • RSA Security Inc. (Nasdaq: EMC)
  • SecureInfo Corp. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Zero-Factor Authentication: Owning Our Data
    Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
    44% of Security Threats Start in the Cloud
    Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
    Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
    Robert Lemos, Contributing Writer,  2/20/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    6 Emerging Cyber Threats That Enterprises Face in 2020
    This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
    Flash Poll
    How Enterprises Are Developing and Maintaining Secure Applications
    How Enterprises Are Developing and Maintaining Secure Applications
    The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-9351
    PUBLISHED: 2020-02-23
    An issue was discovered in SmartClient 12.0. If an unauthenticated attacker makes a POST request to /tools/developerConsoleOperations.jsp or /isomorphic/IDACall with malformed XML data in the _transaction parameter, the server replies with a verbose error showing where the application resides (the a...
    CVE-2020-9352
    PUBLISHED: 2020-02-23
    An issue was discovered in SmartClient 12.0. Unauthenticated exploitation of blind XXE can occur in the downloadWSDL feature by sending a POST request to /tools/developerConsoleOperations.jsp with a valid payload in the _transaction parameter.
    CVE-2020-9353
    PUBLISHED: 2020-02-23
    An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) loadFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL is affected by unauthenticated Local File Inclusion via directory-traversal sequences in the elem XML ...
    CVE-2020-9354
    PUBLISHED: 2020-02-23
    An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) saveFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL allows an unauthenticated attacker to overwrite files via vectors involving an XML comment and /.. pat...
    CVE-2020-9355
    PUBLISHED: 2020-02-23
    danfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled.