|By Business Wire||
|June 26, 2014 09:07 AM EDT||
The majority of desk-based workers in the US and the UK do not believe that sharing their work-related logins represents a security risk to their employer, new research has shown. The findings, revealed in a new report from security software provider IS Decisions, also highlight a particular lack of understanding in organisations’ top levels, with an even greater majority (54%) of those in senior management failing to recognise the risk of sharing login details.
The report, titled ‘From Brutus to Snowden: a study of insider threat personas’, is based on a study of 1000 US and 1000 UK desk-based workers, delving into how perceptions, attitudes and behaviour with regards to security in the workplace differ across demographics, job roles and industries. It reveals that while the majority of people (54%) believe themselves to be considerate of the security of work-related information, many lack the education or understanding to act accordingly. This became apparent in a number of key findings, including:
- Less than a third of people (28%) would know who to report a security breach to in their organisation
- Nearly a quarter (23%) of people have shared their password with one or more of their colleagues, with a further 10% having shared theirs with a manager
- Password sharing is increasing, with 22% agreeing that they share their work logins more frequently now than they did two years ago, with those in marketing (33%), sales (30%) and IT (27%) being the most likely culprits
Age defining attitudes
The report shows a huge difference in security attitudes between younger and older generations, with those in age groups 16 to 24 and 25 to 34 being far more likely to share work logins (35% and 32% respectively) than those of over 35 (15%).
How to alter behaviour
The study also found that the strongest incentive for preventing users sharing passwords is if someone else using your login restricts your own access, cited by 29% as the most likely measure to stop them. This was found to be a particularly effective measure for those younger generations (37% of those aged 16 to 24 and 36% aged 25 to 34).
François Amigorena, CEO of IS Decisions, commented: “Insider threat does not have to be a total unknown. One of the most important steps towards tackling internal security is understanding your own users, and their attitudes and behavior, in order to know the risks and mitigate against them.
“What we’ve found as a recurring theme is lack of education, though manifesting itself wildly differently, with differences between generations, an interesting trend for what appears to be wilful flouting of policy in some regulated industries and a ‘do as I say, not as I do’ attitude from many in senior management. This breadth of different attitudes highlights the need for a tailored approach to tackling internal security, that addresses everyone in an organisation, from top to bottom.”
About IS Decisions
IS Decisions makes it easy to safeguard and secure your Microsoft Windows and Active Directory infrastructure. With solutions for user access control, file auditing, server and desktop reporting, and remote installations, IS Decisions combines the powerful security today’s business world mandates with the innovative simplicity the modern user expects. Over 3,000 customers around the world rely on IS Decisions to prevent security breaches; ensure compliance with major regulations, such as SOX, FISMA and HIPAA; quickly respond to IT emergencies; and gain time and cost-savings for IT.
IS Decisions is a Microsoft Silver Partner based in Biarritz, France. Customers include American Express, BAE Systems, BMW, Computer Sciences Corporation, FBI, Frito-Lay, GlaxoSmithKline, IBM, Lockheed Martin, Mitsubishi, Oxford University, South Wales Police, TimeWarner, United Nations Organization, US Department of Justice, US Department of Veterans Affairs and US Navy Marine Corps.
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
May. 25, 2015 12:00 PM EDT Reads: 1,248
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers ...
May. 25, 2015 12:00 PM EDT Reads: 1,776
Software Development Solution category in The 2015 American Business Awards, and will ultimately be a Gold, Silver, or Bronze Stevie® Award winner in the program. More than 3,300 nominations from organizations of all sizes and in virtually every industry were submitted this year for consideration. "We are honored to be recognized as a leader in the software development industry by the Stevie Awards judges," said Steve Brodie, CEO of Electric Cloud. "We introduced ElectricFlow and our Deploy app...
May. 25, 2015 12:00 PM EDT Reads: 1,575
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
May. 25, 2015 12:00 PM EDT Reads: 4,044
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data...
May. 25, 2015 12:00 PM EDT Reads: 1,716
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
May. 25, 2015 12:00 PM EDT Reads: 1,117
Mobile commerce traffic is surpassing desktop, yet less than 20% of sales in the U.S. are mobile commerce sales. In his session at 15th Cloud Expo, Dan Franklin, Segment Manager, Commerce, at Verizon Digital Media Services, defined mobile devices and discussed how next generation means simplification. It means taking your digital content and turning it into instantly gratifying experiences.
May. 25, 2015 11:30 AM EDT Reads: 3,444
Gartner predicts that the bulk of new IT spending by 2016 will be for cloud platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017. The benefits of the cloud may be clear for applications that can tolerate brief periods of downtime, but for critical applications like SQL Server, Oracle and SAP, companies need a strategy for HA and DR protection. While traditional SAN-based clusters are not possible in these environments, SANless cluste...
May. 25, 2015 11:00 AM EDT Reads: 1,418
Software Defined Storage provides many benefits for customers including agility, flexibility, faster adoption of new technology and cost effectiveness. However, for IT organizations it can be challenging and complex to build your Enterprise Grade Storage from software. In his session at Cloud Expo, Paul Turner, CMO at Cloudian, looked at the new Original Design Manufacturer (ODM) market and how it is changing the storage world. Now Software Defined Storage companies can build Enterprise grade ...
May. 25, 2015 11:00 AM EDT Reads: 4,445
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists will address the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affec...
May. 25, 2015 11:00 AM EDT Reads: 1,249
SYS-CON Events announced today that EnterpriseDB (EDB), the leading worldwide provider of enterprise-class Postgres products and database compatibility solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. EDB is the largest provider of Postgres software and services that provides enterprise-class performance and scalability and the open source freedom to divert budget from more costly traditiona...
May. 25, 2015 11:00 AM EDT Reads: 1,448
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
May. 25, 2015 11:00 AM EDT Reads: 4,732
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
May. 25, 2015 10:00 AM EDT Reads: 5,507
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big D...
May. 25, 2015 10:00 AM EDT Reads: 3,972
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud en...
May. 25, 2015 10:00 AM EDT Reads: 1,713