Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 4 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

CensorNet research: almost half of UK employees put companies at risk through online activities

by The Gurus
May 21, 2018
in Editor's News
Share on FacebookShare on Twitter

CensorNet has announced its research into the application and internet habits of 1000 UK adults, through personal data and insights platform CitizenMe. The survey found that 46 percent were guilty of at least one of the following bad practices, that could potentially put company data or the work network at great risk:

 

  • 22 percent have shared work documents over chat applications such as Whatsapp, Telegram, or Facebook Messenger
  • 18 percent have uploaded confidential work documents to Dropbox, Box or Google Drive without permission. A further 8 percent have accidentally shared a link to confidential files
  • Shockingly, 16 percent used Dropbox, Google Drive, or similar to take company information to a new job
  • 10 percent visited adult websites from a work device or using the work internet connection, and a further 13 percent admitted to downloading or viewing pirated content
  • 25 percent used a work email account to authorise access to other services such as games, productivity apps or social media

 

Unauthorised app use, or shadow IT, is a security challenge that has increasingly plagued organisations as the lines between consumer and enterprise products have blurred. The likes of Dropbox, Box and Google Drive are common “enterprise” offenders that security teams may be aware of but, as the research shows, more people have actually shared documents over messaging apps like Whatsapp.

 

“IT teams might not have even considered that staff are using personal messaging accounts to send work files, but they will now,” said Ed Macnair, CEO of CensorNet. “As we see here, these apps increase the risk of people leaking sensitive data by accident or on purpose. Often there is no malicious motive behind it, it’s simply in people’s nature to find the easiest way to get their job done. But regardless of motive, it’s a gateway out of the building for your sensitive data and a way in for hackers, and security teams can’t afford to leave those gates unlocked.”

 

Employees are also putting their organisations at risk through the websites they are visiting on a work device or while using the work internet. Adult and pirate websites are often cesspools of malware and viruses, which employees are potentially bringing into to the network. Furthermore, while using a work email address for personal accounts sounds comparatively harmless, this means employees are putting their work credentials into the wild. Should one of those personal services be breached, as Yahoo or TalkTalk was, their leaked details could be harvested by cyber criminals to attack the company. People frequently use the same login details for multiple accounts, leaving the company vulnerable to brute force attacks.

 

“Sadly, it is shocking, but not surprising that employees are viewing and downloading adult or illegal content at work or on a company device – but it is the security team’s job to account for human fallibility,” said Macnair. “Simply blocking sites and applications isn’t enough – people will always find a work around, and fringe sites and apps are likely to be even more dangerous. In order to protect against employee’s actions, businesses have to accept that this is what employees are doing and bring them into the fold. They should take a multi-layered approach to security, making sure all of the core threat vectors – email, cloud apps, websites – are being monitored and controlled so that threats can be quickly mitigated.”

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweetShare
Previous Post

Is there a patch for my users?

Next Post

IT teams’ security fears should resonate strongly with the C-suite

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information