How to Security Pros to Users Do as We Say, Not as We Do

How to Security Pros to Users Do as We Say, Not as We Do

Based on last week’s survey results, IT professionals – company security policy gatekeepers – set out to create rules to get things done, according to Absolute Software.

45% of IT professionals admit that they have deliberately acted on their security policies according to the survey.

In addition, 33 percent admitted to hacking their systems or other systems.

Gatekeepers become gatekeepers

Additionally, about 500 US IT and security attorneys participated in the survey, with 46 percent saying that employees pose the greatest security risk to their organization.

“They see employees in their organizations as a threat because employees see security as a barrier,” said Stephen Midgley, vice president of Absolute Global Marketing, “They see IT as a barrier.”

This situation is generally adopted in security circles, but what is generally unknown is the number of IT accountants ready to engage in behavior they condemn to others.

“Surprisingly, data security guards often shatter when it comes to data protection,” Medgale told TechNewsforld.

Take shortcut

This is also true for IT professionals. “They have chosen the fastest way to get the job done,” said Tom Claire, vice president of marketing at Gorokol.

There may be reasons other than cutting corners of employees to circumvent policies and infiltrate their systems.

“There are times when they have to excuse pirates to access their networks or systems,” said Rick Cam, head of identity experts.

Pen test

Security professionals will have to compromise their systems if they test their network penetration.

Code 42’s CSO Rick Orlov said: “If there are vulnerabilities and flaws in your security software somewhere, it is better to find them on your own rather than being exploited by a third party.”

Rules may also be binding on other occasions.

“There may be other times in an emergency, such as when a network device or system is down unexpectedly,” Cam told TechNewsWorld.

Abuse of power

However, it is not uncommon to find people who have power in an institution that creates security problems for it.

CTL of Network Box USA Pearlighi Stella said: “Knowing what I’m doing about the industry from the point of view of a security service provider, I can personally testify that the people at IT level C and C might be someone Also the company’s worst security nightmares. ” .

A generation gap

The full survey found differences between generations in attitudes towards safety.

For example, at ages 18 to 44, 41 percent were more likely to violate their own systems, compared to 12 percent for professionals over 45 years old.

The youth were more optimistic about positivity security. For example, 92 percent of children between the ages of 18 and 44 were confident that the data could be breech compared to 79 percent of their children.

“It’s an original digital game versus a digital immigrant,” Medley said in Medley.

“Young people have grown up with technology,” he said. “They are more skilled at using technology. They can use technology during their career from older people who have adopted technology

A breech diary

15 February. The hacker, known as ROR [RG], dumps 17.8 GB of data stolen from a server run by the Turkish police from the Internet.
15 February. Court records in the KTVT TV report contain sensitive information about tens of thousands of Texas, including children, including anyone who has seen them online for more than a decade.

15 February. Vidant Health announced that it had been discovered that a settlement was reached at Duplin Hospital in North Carolina due to unauthorized access to them from an unknown source of anonymous records.

15 February. California Magnolia Health reports that sensitive information about all active employees was compromised when a spreadsheet containing information was sent to third parties in response to false emails from the company’s CEO.

15 February. The Regional Radiation Center PA announced that an unknown number of patients’ personal information was at risk after records were released by a record disposal vendor in Fort Myers, Florida, as it was on its way to Bhasmarti. After inspection provided by the staff of the center in the area where the records were released, almost all the records are believed to have been recovered.

16. On February 16, the Kankakee Valley REMC in Indiana announced that the records of 17,700 members were in danger after an audit revealed that a storage device on its network had been accessed through a foreign IP address.

Leave a Comment