Hey IT managers, your office workers might <em>say</em> they are following security procedures. But get someone to ask them that question anonymously. Their answers might surprise -- and upset -- you.

Dark Reading Staff, Dark Reading

December 14, 2007

2 Min Read

Hey IT managers, your office workers might say they are following security procedures. But get someone to ask them that question anonymously. Their answers might surprise -- and upset -- you.RSA, the security division of EMC, recently published a survey tantalizingly titled, "The Confessions Survey," thanks to the way the research was conducted, in on-the-street interviews, providing its respondents with anonymity. About a third of the respondents were from small to midsize companies.

According to eWeek, "53 percent of respondents who work for the private sector access work e-mail via a public computer such as at an Internet caf, airport kiosk, hotel or the like."

Moreover, "sixty-eight percent of enterprise workers leave work carrying a mobile devicesuch as a laptop, smart phone or USB flash drivethat holds sensitive job-related information, including customer data, Social Security numbers or company financials."

The kicker is that in response to the survey question: Are you familiar with the IT security policies of your company?, a full 81 percent of business workers answered yes. Furthermore 69 percent of business workers answered yes to the question: Does your company follow training about the importance of following security best practices?

InformationWeek's John Soat flips the percentage and focuses on the 31 percent of those companies that do not provide the necessary training on the significance of following their security practices. While that is almost a third, it doesn't account for all those employees who are familiar with their company's security policies, know about their importance, and continue to flout those rules.

Perhaps that can be explained in the employees' answer to this question in the survey: "Do you ever feel the need to work around your company's established security policies and procedures just to get your job done?" A full 35 percent of business workers said yes.

Obviously security policies need to be implemented and enforced in small and midsize businesses but Soat's quote from RSA acknowledges that there is also a working reality and calls on IT managers to take that into account when establishing security policies:

"Organizations can mitigate this risk by developing information-centric policies that acknowledge and align with the needs and realities of the business. Once such policies are in place, companies should constantly measure actual user behavior against established policy and use what they learn to inform smart policy changes that minimize risk and maximize business productivity. When security is as convenient as possible for end users, they are less likely to work around security policy."

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights