Infrastructure // PC & Servers
News
4/2/2012
01:18 PM
Connect Directly
RSS
E-Mail
50%
50%

Employees Remove Confidential Data At An Alarming Rate

Even when they know it's against policy and could lead to termination, many employees think it's okay to take confidential data out of the office if they have a "good" reason.

At least one in two employees believes it's acceptable to remove confidential data from the office. Sixty-eight percent of employees aged 18-34 say it's acceptable, and 50% of those 55 and older believe it's okay, according to a 2012 FileTrek document security survey of 2,625 Americans age 18 and older.

FileTrek Infographic
When is it okay to take info offsite? Click on the image to see survey details.
The online poll conducted by Harris Interactive found that 90% of adults think that other employees are removing confidential documents from the workplace and 79% believe that doing so is grounds for termination. Employees who removed confidential data from work did so said it was okay under certain circumstances. Specifically:

-- When the boss says it's okay: 48%
-- To finish a late-night project from home instead of having to stay at the office: 32%
-- To work over the weekend or while on vacation: 30%
-- When it is confidential information about themselves: 16%
-- When it can be brought back to the office before the boss knows it was gone: 2%
-- To show something to family or friends who promise to keep it confidential: 2%

Loose regard for confidential data has combined with free abundant disk space, the fluidity of the Internet, and simple drag-and-drop cloud repositories to create a new type of data loss right under the nose of IT.

The IT department already is busy defending data from more conventional attacks, such as socially engineered spear-phishing attacks, brute-force hacks on admin passwords, or raids on databases. These attacks come at the perimeter but a growing type of data loss is coming from the inside--users who lose an unencrypted thumb drive or laptop, or who share a couple of gigabytes in SugarSync.

Once the data has left the domain, it essentially is lost because control of the data has been lost. Shadow IT projects--those unknown by IT--create data sprawl and contribute to greater risks for data loss. Multiple versions of a spreadsheet can be anywhere in or out of the organization and even robust document management systems such as Autonomy Filesite, which can create user profiles, version histories, and audit trails, cannot trace the location of files that have been locally checked out of the repository.

There's also the problem of change conflicts. When there are multiple copies of data and no change-management system in place, it can be hard to know which version of the file is the most current.

So why do nearly half of employees think it's fine to move confidential data offsite--yet 79% also believe it's grounds for termination? I put this question to Dale Quale, CEO of FileTrek. "It's kind of like when you were a kid," said Quale. "Your parents tell you don't play with matches, but until you get burned ... you think of it as more of a guideline than as a rule. In other words, you have to get caught or have a fear of getting caught. I don't think people fear being caught. IT policy still hasn't caught up with the new consumerized enterprise, so the penalties really aren't in place." Quale added, "It's all about how they've grown up. People post private information about themselves all the time and share it with complete strangers. I think it's difficult for them to distinguish between workplace confidentiality and personal confidentiality."

FileTrek--who sponsored the Harris survey--is one of a number of startups such as box and Egnyte to combine document management with cloud storage. And though it's not an enforcer, FileTrek provides the ability to trace and audit data even outside the enterprise. Once a file is shared there is a forced compliance: the recipient must install the desktop client (an iOS app is coming soon) in order to open and view the file. Once the recipient does this, the audit trail continues. If the recipient doesn't install the software, they can't use the file. Changes made to the file are changed in all iterations.

Used with a clearly defined policy that both details the scope of what's confidential and the consequences for failing to comply, products such as FileTrek can act as a deterrent to private data leaving the company. It puts users on notice that their actions are being tracked. At the same time, it doesn't interfere with the overall goal of sharing files with colleagues and clients.

Comment  | 
Print  | 
More Insights
Server Market Splitsville
Server Market Splitsville
Just because the server market's in the doldrums doesn't mean innovation has ceased. Far from it -- server technology is enjoying the biggest renaissance since the dawn of x86 systems. But the primary driver is now service providers, not enterprises.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A UBM Tech Radio episode on the changing economics of Flash storage used in data tiering -- sponsored by Dell.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.