Sunday, March 25, 2012

Young Employees and Data Security Risks

The most costly security breaches are the unauthorized access to sensitive information. The “Nitro” attack was a small-scale attack on industrial, aviation and chemical companies. Successful attacks were at a low count of 39 reported cases. The intention of the attack and the destination of the data stolen are unknown. Imagine your operation plans and trade secret of your company was stolen. This data ends up into the hands of your rivaling company. Imagine the damage that can be done to your company when this company knows what you will do and when. You have lost the element of surprise and your rival company gains an advantage over you. Security has improved and is capable of stopping and tracking the sources of attacks directly at the systems. Attackers are now relying more on human error to give them access to identities and further access to systems.

Cisco’s 2011 annual report displayed some alarming statistics on the practices of young adults age 18 – 23. The report showed these young adults had an alarming disconnect with safe technology practices. They often times believe that the Information Technology policies of companies are out dated and prevents them from doing their job. The reports showed that 1 in 4 college students have experienced identity theft. These young adults give friends and even strangers unsupervised and unrestricted use of their personal devices. Even though many have seen grave consequences, they still willingly partake in such activities. The report showed an alarming number of young employees admitting they break company IT policies, as they believe that protection of data is the responsibility of the corporation.

Worth the Read:

http://www.canadiansecuritymag.com/IT-Security/News/Cisco-report-Young-employees-present-data-security-risk.html#topart

1 comment:

  1. Many people don't take the protection of data as seriously as they should.
    Data protection, especially in competing companies, is a very delicate matter and must be handled with greatest caution.

    I can say the same thing about me and many of my friends. We do not hesitate to give somebody our password to log onto the university computers even though we should think twice about giving access to private information.

    ReplyDelete