Pop quiz: How many employees violate corporate IT policies?
Survey reveals that more than one-third admit to inappropriate computer behavior
Computerworld - As many as 35% of workers have knowingly violated their corporate IT policies at least once, according to results of a study released this week.
Between Aug. 23 and Sept. 6, MARC Research polled 301 U.S.-based workers in businesses with at least 100 employees about their corporate computer usage.
The Information Systems Audit and Control Association, a Rolling Meadows, Ill.-based professional association that represents some 65,000 IT professionals who are responsible for auditing computer systems, commissioned the study.
The survey also found that while 84% of respondents are comfortable with workplace computer security measures, 64% said their home computers are not adequately protected.
Despite warnings about security threats posed by peer-to-peer file-sharing systems, 15% of respondents admitted logging onto such networks from work computers. And 74% of respondents said they don't believe that downloading unauthorized content or software to work PCs is a business risk.
The survey also found that 73% of respondents are not worried about sending sensitive or confidential company information from work PCs to home systems via e-mail. Further, 68% said they regularly work on business documents that were sent from business systems to home PCs.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts