More than half of corporate IT users are working around their companies' IT security policies in order to get their jobs done.
This is one of the findings of RSA's llatest insider threat survey, conducted among attendees at industry events in North America and Latin
The survey polled 417 individuals who confessed to their work-related security behaviors and attitudes.
The survey respondents work across a range of industries, with a heavy concentration within the financial and technology sectors. Almost half of the respondents' job functions were in information technology.
During this era of well-publicised data breaches, the results indicate that even those who should know better are not exempt from the everyday behaviors that can trigger significant risk to sensitive business information.
Of the respondents polled:
* 46% work in the financial services sector;
* 20% work in the technology sector;
* 46% are IT professionals;
* 11% are executives; and
* 54% work in companies with more than 5 000 employees.
The survey shows that employees are well aware of the restrictions placed upon them by their corporate IT departments, yet many often work around these controls in order to get their jobs done in a convenient and timely manner.
Of all respondents polled:
* 94% are familiar with their organizations' IT security policies, yet 53% have felt the need to work around IT security policies in order to get their work done;
* In response to a separate question, 64% frequently or sometimes send work documents to their personal email address in order to access and work on them from home.
* At a US event, this statistic decreased to 50%, but increased to 62% at a Mexico event and 71% at a Brazil event;
* 15% have held a door open for someone at work that they did not recognise – the Brazil event reported the best figures at 7%, followed by 16% at the Mexico event. By contrast, the results from the US event revealed almost one in three insiders (31%) have let a stranger into their workplace.
When trusted insiders work around security policies, sensitive data can be exposed that places businesses and their customers – often consumers – at unnecessary risk.
Organisations can greatly mitigate this risk by developing information-centric security policies that acknowledge and align with the needs and realities of the business. This can help guard the integrity and confidentiality of information throughout its lifecycle-no matter where it moves, who accesses it or how it is used.
In a mobile world, the survey affirms that employees depend on remote access to corporate information when outside the office, whether at home or in public places.
Of all respondents polled:
* 89% frequently or sometimes conduct business remotely over a virtual private network (VPN) or webmail; and
* 58% frequently or sometimes access their work e-mail via a public computer, and 65% frequently or sometimes access their work e-mail via a public wireless hotspot.
Remote access to sensitive data requires stronger forms of authentication than a simple, static and vulnerable combination of a username and password. To help solve this problem, organizations can maintain the flexibility and convenience of remote access to VPNs and webmail by providing one-time passwords via a hardware token, or a software token that is easily accessible on mobile devices.
The survey findings show that, in order for employees to be most productive, information has to be free to move. However, employee mobility increases the collective responsibility of protecting the information that is carried outside of the organisation.
* Of the respondents polled:
* One in 10 has lost a laptop, smartphone and/or USB flash drive with corporate information on it;
* The Mexico event reported the highest incidence of exposed corporate data, with a staggering 29% of all respondents confirming that they had lost a laptop, smartphone and/or USB flash drive, while the US event had the lowest figures, at 5%; and
* 79% frequently or sometimes leave their workplace carrying a mobile device containing sensitive information related to their jobs, such as a laptop, smartphone and/or USB flash drive.
Organisations are dynamic and individuals' roles often change within the organization – be it an employee's internal move to a different job function or an outside consultant who moves on after the completion of an engagement. However, the governance of the corporate network does not always stay in lockstep with these moves.
Of all respondents polled:
* 43% had switched jobs internally and still had access to accounts/resources which they no longer needed;
* The Mexico event reported the best results with 30%, followed by the Brazil event at 42%. However, at the US event, one out of every two respondents (50%) still had access to unnecessary areas of their corporate systems;
* 79% reported that their company employs temporary workers and/or contractors who require access to critical organizational information and systems; and
* 37% have stumbled into an area of their corporate network to which they believe they should not have had access.
"The survey reveals that it is as important for businesses to diligently enforce information security controls and policies focused on protecting the everyday actions of well-meaning, innocent insiders as it is to enforce those designed to defend against those with malicious intent," says Rob Watson, RSA country manager for South Africa.
"It remains clear that businesses need to take a layered approach to security to help mitigate the insider threat and keep data safe. As such, it is important for any organisation to know who has access to your information; control access through policy; monitor for suspicious activity to verify user identities; create and enforce data security policies and controls; and transform real-time event data into actionable compliance and security intelligence."