Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 2 April, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

IT and Employees Don’t Always See Eye to Eye on Cybersecurity

Rick Goud, Co-founder & Chief Innovation Officer, Zivver, writes about IT and employees not seeing eye to eye on cybersecurity

by Guru Writer
September 1, 2022
in Featured, Insight
IT and Employees Don’t Always See Eye to Eye on Cybersecurity
Share on FacebookShare on Twitter

Although organisations appear to be highly concerned with cybersecurity, they often don’t follow the practices put into place to prevent a data leak. One of the reasons is that IT leaders and employees have completely different views on security measures, and another being the lack of emphasis on security risks, such as outbound threats, where data security training can often be out of date.

According to Zivver’s Freedom to Focus research, 47% of employees believe IT teams should be responsible for email security. And this isn’t the only disconnect. In fact, although 43% of IT leaders are concerned about data loss through email, preventative measures often aren’t put into place. Instead, IT leaders put a huge emphasis on inbound security threats, such as phishing, ransomware, and malware, so the severity of outbound risks can often be overlooked.

Businesses aren’t as secure as they think

Businesses often present themselves to be highly proactive when it comes to their cybersecurity needs, but unfortunately, vital security aspects can be missed. 77% of organisations don’t keep their approach to risk and email security under constant review. This means businesses are still trying to push outdated and unused security measures, such as time-consuming protocols and processes.

With both employees (81%) and IT leaders (89%) viewing email as the most secure way to send sensitive information, it is clear there is a gap in today’s data protection. Accidents like sending the wrong attachment or using ‘reply all’ by mistake are just two examples of the email mishaps that employees admit to. Without a reliable preventative measure in place, these errors will continue to occur.

IT leaders and employees aren’t seeing eye to eye

Although 85% of IT leaders say there is always a place for data security training, a third (33%) of employees don’t see any value in it. Given there is a disconnect between employees and IT leaders, it’s no surprise that the current procedures aren’t as effective as expected.

Since both IT leaders and employees agree that email is the business-essential as opposed to collaborative platforms such as Teams, Slack, or Workplace, the need to ensure it is safe is highly important. Reducing the number of IT systems and training programs is one step to a more secure digital environment, but the most important is implementing a solution that helps reduce the load.

Security shouldn’t be a burden

Businesses need to free up employee time instead of burdening them with extensive protocols. By implementing solutions that work automatically, employees will instead become empowered and less stressed. In fact, almost half (49%) of IT professionals believe that progressive risk management looks like the use of more smart technologies.

Organisations not only need to understand how their employees react to security measures, but also put more emphasis on the whole scope of security risks. To actively progress, IT leaders need to implement smart solutions that actually work, instead of relying on and burdening their employees with extensive training procedures.

With a frequent review of security practices and ensuring risk is more proactive, rather than reactive, businesses will begin to flourish as their security is no longer left to IT leaders or at the hands of busy employees.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Security Serious Unsung Heroes Awards 2022 Seeking Nominations for Extraordinary People in Cybersecurity

Next Post

Does Blockchain really offer Better Digital Security?

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information