{"id":14897,"date":"2013-10-01T16:39:32","date_gmt":"2013-10-01T16:39:32","guid":{"rendered":"http:\/\/business.kaspersky.com\/?p=1058"},"modified":"2020-12-23T12:25:53","modified_gmt":"2020-12-23T17:25:53","slug":"users-habits-what-employees-bring-and-take-back-home","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/users-habits-what-employees-bring-and-take-back-home\/14897\/","title":{"rendered":"User&#8217;s habits: what employees bring and take back home"},"content":{"rendered":"<p>In a <a href=\"https:\/\/business.kaspersky.com\/mobile-devices-at-work-and-home-the-blurring-borderline\/\" target=\"_blank\" rel=\"noopener nofollow\">recent post<\/a> we wrote about how the line between \u201cwork\u201d and \u201cpersonal\u201d devices today is increasingly blurred. Users will not buy a separate smartphone or a tablet for work purposes if they already have such a device for their household needs. However, the problem is much bigger than users think. An average user brings all the habits associated with the use of personal gadgets and their activities on the Internet from home to work. There are quite harmful habits among them too, such as not using security software on personal mobile devices at all. According to a <a href=\"http:\/\/media.kaspersky.com\/pdf\/Kaspersky_Lab_B2C_Summary_2013_final_EN.pdf\" target=\"_blank\" rel=\"noopener nofollow\">joint survey<\/a> by B2B International and Kaspersky Lab in 2013, only 40% of smartphone users and 42% of tablet users ever installed security software, with no more than 19% ever having taken care of encrypting data.<\/p>\n<div class=\"pullquote\">54% of companies believe their own workers are a major threat to IT security.<\/div>\n<p>The same applies to the use of the Internet and other aspects of \u201cdigital\u201d life. If the user has \u201cunhealthy\u201d habits at home, in terms of information security like opening any links from friends (without carefully looking at the address bar), extracting email attachments, etc., then he or she is going to follow those patterns at work as well.<\/p>\n<p>What does that mean? The recent survey by IT Governance <a href=\"http:\/\/www.itgovernance.co.uk\/download\/Cyber-Watch-Survey-Report-FINAL.pdf\" target=\"_blank\" rel=\"noopener nofollow\">states<\/a> that 54% of companies believe their own workers are a major threat to IT security. This implies that system administrators expect incidents caused by the actions of the company\u2019s employees. These are imprudent or just dangerous actions from the point of view of IT security.<\/p>\n<p>\u201cAccording to surveys in <a href=\"http:\/\/www.europeanceo.com\/home\/featured\/2013\/04\/9120\/\" target=\"_blank\" rel=\"noopener nofollow\">Europe<\/a> and the <a href=\"http:\/\/www.salary.com\/2013-wtaw-infographic\/\" target=\"_blank\" rel=\"noopener nofollow\">United States<\/a> employees of companies spend up to 30% of their working time on personal issues, \u2013 Kaspersky Lab expert Kirill Kruglov wrote in his <a href=\"http:\/\/www.securelist.com\/en\/blog\/8109\/Security_policies_misuse_of_resources\" target=\"_blank\" rel=\"noopener nofollow\">article<\/a>. \u2013 Working computers are used by employees for social networking, trading links to entertainment content, downloading files from suspicious resources.\u201d<\/p>\n<p>Cybercriminals very actively use social networks to conduct phishing campaigns and distribute malware and malicious links. There is always some kind of infection pestering entertainment sites too, so \u201ccarefree\u201d users may be a very serious threat to the corporate infrastructure and data.<\/p>\n<p>Naturally, the question arises about the ways to deal with this situation. It is surely tempting to enable strict rules for everything by forming a very limited list of network resources that employees have the right to enter, or by totally banning the use of personal mobile devices within the corporate network, and so on. Business requires the maximum productivity from employees; therefore, it minimizes the misuse of working resources.<\/p>\n<p>However, productivity may decrease not just because employees are spending time on social networking instead of work, but rather because of abundant repressive measures. Moreover, the BYOD principle, for example, may not be disregarded entirely now, unless the company is eager to pass as an \u201cevil empire,\u201d where employees are stripped of mobile phones and not allowed to enter social networks at all.<\/p>\n<p>So, the risks of BYOD have to be <a href=\"https:\/\/business.kaspersky.com\/typical-byod-threats\/\" target=\"_blank\" rel=\"noopener nofollow\">heeded and considered<\/a> to ensure the safety of the corporate network.<\/p>\n<p>Secondly, of course, robust <a href=\"https:\/\/business.kaspersky.com\/methods-of-protection-against-malicious-software\/\" target=\"_blank\" rel=\"noopener nofollow\">protective means<\/a> must be applied to block malware, deflect phishing attempts, and nullify zero-day exploits. Restricted access to web resources from the corporate network and monitored traffic are needed, too. It is also necessary to install clients using the same security solution that the company uses on all mobile devices in the corporate network.<\/p>\n<p>But beyond that, employees must be taught the basics of IT security. If a third of the workday is spent on unclear purposes then why not reserve one hour a week for training of this kind? With the increasing complexity of systems, such training is becoming as urgent as establishing a security policy within the company.<\/p>\n<p>Meanwhile, according to the <a href=\"http:\/\/media.kaspersky.com\/en\/business-security\/Kaspersky_Global_IT_Security_Risks_Survey_report_Eng_final.pdf\" target=\"_blank\" rel=\"noopener nofollow\">study of global corporate risks in the IT sector<\/a> by B2B International and Kaspersky Lab, only 52% of respondents stated that employees in their companies are serious about IT security rules and abide by them. 32% of respondents agreed that the personnel neglects compliance with the rules, while 38% admitted that their company employees do not understand the reason for such a policy.<\/p>\n<p>This is the fog of misunderstanding that has to dispel. Some progress has been made already: 60% of respondents said their company employees regularly receive newsletters with descriptions of actual threats, and 58% of the surveyed companies have specialized personnel training programs.<\/p>\n<p>If company employees get in the habit of safe IT practices at work, there is reason to believe that in the end, they will try to ensure an appropriate level of protection at home, too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent post we wrote about how the line between \u201cwork\u201d and \u201cpersonal\u201d devices today is increasingly blurred. Users will not buy a separate smartphone or a tablet for<\/p>\n","protected":false},"author":209,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[415,251,2042],"class_list":{"0":"post-14897","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-business","7":"category-smb","8":"tag-byod","9":"tag-corporate-security","10":"tag-it-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/users-habits-what-employees-bring-and-take-back-home\/14897\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/users-habits-what-employees-bring-and-take-back-home\/14897\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/users-habits-what-employees-bring-and-take-back-home\/14897\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/byod\/","name":"BYOD"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14897"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14897\/revisions"}],"predecessor-version":[{"id":38221,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14897\/revisions\/38221"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}