Pop quiz: How many employees violate corporate IT policies?
Survey reveals that more than one-third admit to inappropriate computer behavior
Computerworld - As many as 35% of workers have knowingly violated their corporate IT policies at least once, according to results of a study released this week.
Between Aug. 23 and Sept. 6, MARC Research polled 301 U.S.-based workers in businesses with at least 100 employees about their corporate computer usage.
The Information Systems Audit and Control Association, a Rolling Meadows, Ill.-based professional association that represents some 65,000 IT professionals who are responsible for auditing computer systems, commissioned the study.
The survey also found that while 84% of respondents are comfortable with workplace computer security measures, 64% said their home computers are not adequately protected.
Despite warnings about security threats posed by peer-to-peer file-sharing systems, 15% of respondents admitted logging onto such networks from work computers. And 74% of respondents said they don't believe that downloading unauthorized content or software to work PCs is a business risk.
The survey also found that 73% of respondents are not worried about sending sensitive or confidential company information from work PCs to home systems via e-mail. Further, 68% said they regularly work on business documents that were sent from business systems to home PCs.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts