Showing posts with label Working. Show all posts
Showing posts with label Working. Show all posts

Are Employees "Working Around" Your Security?


In a white paper released last November by RSA, research from ordinary person-on-the street interviews with random office workers revealed troubling trends for those concerned with information security. Sometimes in an honest effort to finish their work from home or while traveling, sometimes through simple carelessness, but in either case without intending to put secure information at risk, employees from all sectors of the workplace admitted to behaviors which do, in fact, put secure information at risk.

In interviews conducted in Boston and Washington, D.C., employees from both the public and the private sector answered "frequently," "sometimes," or "never" to questions probing their own customary behavior and also to questions asking what they had observed in their workplace. Employers with international networks full of proprietary and confidential private information, including social security numbers and other personally identifying information, were reported by nearly 20% of private enterprise employees as routinely leaving networks set up for conference room and guest use open and available, without a password, to anyone who might walk in.

Employees themselves, with their own logins and passwords, accessed their work-network at home, in airports, in hotel and restaurant hot-spots, and even, at times, on public access hotel or internet cafe-type computer terminals. In fact, the number of workers who retrieved their work e-mail from a public access computer was slightly higher than the number who used their own laptop but at a public wireless hotspot. Both numbers, however, were over 50%. Since well over 80% of workers reported that they "frequently" or "sometimes" conduct business over some kind of network away from their workplace, one can conclude that perhaps 30% of employees access work from a home computer, either by modem high speed internet connection.

More knowledge of security protocols will not solve the problem, according to RSA. Almost all employees confirm that they have been trained in their employer's security policies and that they are familiar with those policies. Nevertheless, they hold doors to secure areas open for persons they don't recognize, they notice people they don't know working in empty offices without comment, and they find themselves with access to parts of the network they know they have no need to see.

Perhaps most troubling, a full third of all employees surveyed answered "yes" to the question, "Do you ever feel that you need to work around your company's established security policies and procedures just to get your job done."

RSA concluded its report, provocatively titled "The Confessions Report," with a summary of its findings and a set of "Recommendations for Managing Information Risk." The recommendations call for a "holistic, information-centric security strategy [that] takes people, processes and technology into account and has a feedback mechanism." Clearly, an alert has been sounded.




Christopher is an Information Security Consultant for Lexan Systems LLC. You are welcome to reproduce this article on Computer Security related web site, as long as you reproduce the article in full, including this resource box and link to our website.




Paid Surveys - Suggesting Best Online Working Styles!


There are lots of people who know about online paid surveys and can deliver lecture on this wonderful business opportunity. But out of them, only few are successful in taking surveys and earning big money. Most of the people do not possess the practical knowledge about the whole business cycle and hence, they can not make satisfactory cash from their efforts. The half cooked meal is not suitable for your body. Similarly, the lack of knowledge may land you in trouble. The internet is full of paid surveys scams sites that do offer survey jobs but do not pay you for taking up the job.

Like any other online business opportunity, you have to be very careful about the cyberspace threats in paid surveys business. Your desktop should definitely have the anti spy ware so that you can confront any type of intrusion attempt. Also, it is suggested that you should always keep your desktop fine tuned so that it should not undergo any breakdown while you work online. Most of the paid surveys are driven by sessions. Once you log in to a survey site by inputting your user name and password, a session between your computer system and the web server of the survey site gets established. As log in as this session is not interrupted you are safe. If due to some hardware failure or power breakdown the computer shuts down, then you have to retake the whole survey.

The paid survey applications are developed using latest internet technology. In order to browse the survey site, you need to have the latest version of browser on your computer system so that it executes every script that the site contains. To facilitate the remembrance of the domain names or the URLs of the survey sites, you should add them in your browser favorites. These tips not only prepare you to work efficiently but also save you from potential computer risks. The safety lies in getting educated about the source of cyber threat and preventing them from happening. The computer security guidelines presented here reduces your vulnerability levels to the minimum so that you work proficiently in the online market place.




Apply for Free: Top 5 Networks of Paid Survey Sites. Get paid $10-$75 Per Survey

Alex and Kelly are experts on Paid Surveys and runs the resource site Free Survey List, which features a top 7 list of the 100% free paid survey sites she has made the most amount of money on, along with a review of each!

100% Free to Join. Featured on CNN, Forbes and Money Networks as the Best ways of earning a Second Income Online!




 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Information Computer and Technology - All Rights Reserved
Template Modify by Creating Website
Proudly powered by Blogger