Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/23/2006
09:33 AM
50%
50%

Webmail is Rife, & Risky

Survey says companies allow staff to access personal Web-based email accounts at work

ATLANTA -- Integrated email and Internet content security provider Marshal Inc., reveals that a recent poll* on its TRACE Website shows that 48 percent of those surveyed work for companies that allow staff complete and unrestricted access to personal web-based email accounts at work.

The findings further highlight the need for businesses to understand the potential risks associated with web-based email accounts such as Hotmail, Yahoo! Mail and Gmail, as these services circumvent normal email content checks. Only 33 percent of those surveyed admit to their employer banning – and enforcing with technology – the outright use of webmail, with 8 percent of respondents admitting their employer has prohibited the use of webmail, but with no technology in place.

Marshal’s CEO Ed Macnair comments, “we often ask our customers: ‘what are the legitimate business reasons for allowing employees to access personal webmail accounts at work.’ The response is often: ‘none’. There are very few business-related reasons to allow – but many reasons to deny – webmail access at work. Webmail can be a backdoor through which employees trade private company information, download or exchange inappropriate material or simply chat with their friends on company time. 48 percent of companies without measures in place to prevent these issues is far too high a figure. ”

Marshal Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13116
PUBLISHED: 2019-10-16
The MuleSoft Mule runtime engine before 3.8 allows remote attackers to execute arbitrary code because of Java Deserialization, related to Apache Commons Collections.
CVE-2019-17664
PUBLISHED: 2019-10-16
NSA Ghidra through 9.0.4 uses a potentially untrusted search path. When executing Ghidra from a given path, the Java process working directory is set to this path. Then, when launching the Python interpreter via the "Ghidra Codebrowser > Window > Python" option, Ghidra will try to ex...
CVE-2019-17665
PUBLISHED: 2019-10-16
NSA Ghidra before 9.0.2 is vulnerable to DLL hijacking because it loads jansi.dll from the current working directory.
CVE-2019-17435
PUBLISHED: 2019-10-16
A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.
CVE-2019-17436
PUBLISHED: 2019-10-16
A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system.