Security Efforts Founder Amid Lax Compliance


The best IT security policies are only effective if employees abide by them, and these days that can be a big “if.” More than half (53%) of employees in a recent international survey said they work around their company’s IT security policies to get work done.

Other findings included:

64% frequently or sometimes send work documents to their personal e-mail address to work on them from home.

One in 10 has lost a laptop, smartphone and/or USB flash drive with corporate information on it. For U.S. employees, only 5% reported such a loss.

43% have switched jobs internally but still have access to accounts and/or resources that they no longer need.

37% have stumbled into an area of their corporate network to which they believe they should not have had access.

15% have held a door open for someone at work whom they did not recognize. Among U.S. employees, almost one in three (31%) has let a stranger into the workplace.

The survey by RSA, the security division of EMC Corp., polled more than 400 attendees at industry conferences in the United States, Mexico and Brazil.

Source: EMC Corp., The 2008 Insider Threat Survey, www.emc.com.

SPONSORED REPORT

Revenue recognition: A complex effort

Implementing the new standard requires careful judgment. Learn how to make significant accounting judgments and document them and collaborate with peers for consistent application.

VIDEO

How to Excel pivot a general ledger

The general ledger is a vast historical data archive of your company's financial activities, including revenue, expenses, adjustments, and account balances. J. Carlton Collins, CPA, shows how to prepare data for, and mine data with, PivotTables.

QUIZ

News quiz: Taking an economic snapshot and looking to the future

Recent news included IRS actions that affect individuals and partnerships and a possibly influential move by a Big Four accounting firm.Take this short quiz to see how much you know about the news.