IT security and data breaches have been getting more attention in the IT security media lately, highlighting the importance of strong password security measures and the need for complete data protection. Despite this employees are not putting security first when it comes to their work or passwords.
A survey conducted by Vanson Bourne showed that 20% of global employees and 27% of American employees would sell their work passwords for, between $100 to $1000. With employees happy to hand over confidential company data for a quick (and not every lucrative) payday companies should be demanding that IT put in place processes that promote and ensure good password hygiene and stress the importance of IT security and data security.
IT security breach statistics
In the same survey, employees went on to admit that:
- 65 percent use the same password in multiple locations
- 32 percent share passwords with co-workers
- 42 percent could continue to access company accounts and data when they have moved on to a new job
- One in three employees use public cloud services for work, entirely outside of the company’s control.
- 49% by-pass IT, because they feel IT takes too long to get things done
Protecting data against breaches
The data created and stored on laptop and desktop computers is particularly vulnerable to breaches, theft and loss. The simplest way of protecting endpoint data is to back it up regularly to ensure that files can always be recovered in the event of a data loss incident. The next step in data protection is local data encryption, which encrypts files stored directly on laptops and desktops and makes it inaccessible to unauthorized users.
IT should consider all users in the company as part of the perimeter when it comes to potential data breaches. Getting employees to buy-in to the company’s security strategy should be a priority for every CIO, because without employees trusting and believing in what IT does, data breaches will be harder to control.
Discover the 7 Must-Haves of Endpoint Data Protection, access your free report here.
To discover how easy endpoint data protection and IT security can be, watch the Cibecs demo here.
Follow @Cibecs on Twitter