WebsiteGear Logo Log In
New User? Sign Up
About | Contact | FAQ
  Home News Technology Internet Security Sunday, May 27, 2018 
Add Press Release News | News Feeds Feeds | Email This News Email


Employees Use Personal Devices to Access Company Email and Shared Documents, Often Without Oversight
Tuesday, May 15, 2018

New research from Clutch reveals that employees often exhibit cybersecurity best practices beyond the bounds of their companies' security policies.

Employees Use Personal Devices to Access Company Email and Shared Documents, Often Without Oversight

New research from Clutch reveals that employees often exhibit cybersecurity best practices beyond the bounds of their companies' security policies.

WASHINGTON, May 15, 2018 /PRNewswire/ -- Nearly two-thirds (64%) of employees use a company-approved device for work. However, less than half (40%) of those who use a personal device are regulated when using that personal device, according to a new survey of 1,000 full-time employees published by Clutch, a B2B research firm.

Employees use personal devices for routine, daily work activities. Among those surveyed who use a personal device for work, 86% check their email and 67% access shared company documents.

"Normal," or accepted employee behavior, often presents the most dangerous security threats, according to Randy Battat, CEO of PreVeil, a company that provides end-to-end encryption for email and file sharing.

"Employees believe that information that needs to be protected is special, sensitive stuff that's explicitly marked and that most of the everyday communications they receive and send aren't a risk for their organizations," Battat said. "The reality is that the majority of communications and an organization's intellectual capital can be found in the 'ordinary' email."

Passwords Are the Front Line of Employee Security

Most employees use passwords as the primary form of IT security at their company. Over three-fourths (76%) practice some form of password protection, the survey found.

In addition, password update reminders are the most common cybersecurity policy employees encounter: Two-thirds (67%) of employees receive updates, followed by internet restrictions (55%) and user permission prompts (53%).

"[Employees] get that they have to change their password regularly because it's an obvious protection. There's a responsibility about that at an individual level," said Steve Scott-Douglas, CIO of Ciklum, a software engineering and solutions company.

Most employees, however, use the simplest method of password protection: regularly updating their passwords. At least twice as many employees update passwords regularly (82%) compared to using complex password protection methods such as multi-factor authentication (41%) or a password manager (20%).

Employees Follow Cybersecurity Best Practices Beyond Company Policies

In several areas of cybersecurity, employees exhibit secure behavior that goes beyond their company's policy.

For example, more employees report security incidents (60%) than go through cybersecurity policy or compliance training (59%).

This finding indicates that employees have a general understanding of IT security threats and best practices. However, without regular training or communication from their company, they may fail to recognize when they encounter security policy.

Most employees (52%) receive security policy training once per year, according to the survey.

The study suggested that to ensure employees recognize and comply with security policy, companies should implement consistent cybersecurity policy training.

To read the full report and source the survey data, visit: https://clutch.co/it-services/resources/how-employees-engage-company-cybersecurity-policies.

For the raw data, a comment on the findings, or an introduction to the experts interviewed for this report, contact Grayson Kemper at 195119@email4pr.com.

About Clutch
A B2B research, ratings, and reviews firm in the heart of Washington, DC, Clutch connects small and medium businesses with the best-fit agencies, software, or consultants they need to tackle business challenges together and with confidence. Clutch's methodology compares business service providers and software in a specific market based on verified client reviews, services offered, work quality, and market presence.

Contact
Grayson Kemper
(202) 470-0491
195119@email4pr.com

View original content with multimedia:http://www.prnewswire.com/news-releases/employees-use-personal-devices-to-access-company-email-and-shared-documents-often-without-oversight-300648449.html

SOURCE Clutch



Email This News Email | Submit To Slashdot Slashdot | Submit To Digg.com Digg | Submit To del.icio.us Del.icio.us | News Feeds Feeds

RELATED NEWS ARTICLES
Nav Predictive & Prescriptive Analytics: Global Market Forecasts 2018-2023 with Analysis by End-User and Geography | May 25, 2018
Nav How To Prevent Winter Conditions Damage Your Car | May 25, 2018
Nav iovation Introduces New Capabilities to its Fraud Prevention Solution | May 24, 2018
Nav Brands that are Most Trusted in the United States revealed across 115 consumer categories | May 23, 2018
Nav Home Health Hub Market - Global Forecast to 2023 | May 18, 2018
Nav The Humanized Internet Wins Business Worldwide Magazine Award for its Outstanding Commitment to Online Ethics and Security | May 16, 2018
Nav Cloud security experts at Hornetsecurity dispute headlines questioning email encryption standards | May 16, 2018
Nav The Big Cyber Attack is Coming 85% of IT Security Pros Tell Pwnie Express | May 16, 2018
Nav 'America First - The MAGA Manifesto' is Released | May 15, 2018
Nav Minerva Labs and BlueVoyant Team Up To Contain Evasive Cyberattack | May 15, 2018
NEWS SEARCH

FEATURED NEWS | POPULAR NEWS
Submit News | View More News View More News