Workers Ignore Data Rules - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Workers Ignore Data Rules

One in five of those surveyed admit to lending portable devices used to store sensitive work documents to co-workers.

As enterprises strengthen defenses to prevent data loss from outside attack, their own workers' wide disregard of rules puts information at risk, a security company said Monday.

A poll of more than 300 American office workers released by McAfee revealed that while the majority -- 84% -- operate under company rules about how to treat sensitive information, 1 in 5 admitted to leaving confidential documents in a common printer output tray. A similar number said they sometimes lend portable devices used to store sensitive work documents to co-workers.

"Policy combined with technology that focuses on outside attacks alone clearly isn't enough to protect companies from the threat of data loss," said Vimal Solanki, McAfee's senior director of worldwide product marketing, in a statement. "The harsh reality is that sensitive corporate data can easily end up in the wrong hands -- deliberately or accidentally -- because of employee behavior."

In other survey findings, the poll noted that of the workers who said they transfer customer data out of the organization, 88% admitted to using e-mail for the move, with 23% of that group saying that they use even less-secure Web-based e-mail to transfer data out of office.

Nearly 4 out of every 10 workers polled said that they take up to 10 documents out of the office each week on a variety of portable devices: laptops (41%), USB flash drives (22%), and CDs (13%).

Also on Monday, McAfee announced Data Loss Prevention Host, a software agent-server software combination that lets data administrators deploy centrally managed policies to end-point systems to lock down and/or track all data leaving those clients via e-mail, IM, print, USB drives, CDs, and other avenues.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Commentary
Augmented Analytics Drives Next Wave of AI, Machine Learning, BI
Jessica Davis, Senior Editor, Enterprise Apps,  3/19/2020
Slideshows
How Startup Innovation Can Help Enterprises Face COVID-19
Joao-Pierre S. Ruth, Senior Writer,  3/24/2020
Commentary
Enterprise Guide to Robotic Process Automation
Cathleen Gagne, Managing Editor, InformationWeek,  3/23/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Careers: Tech Drives Constant Change
Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market. Read it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll