INGATE

From The Sip Trunking Experts

TMCNet:  ISACA Survey: UK Workers Feel Online Privacy Is Threatened, But Gap Exists Between Fears and Actions; BYOD gains rapid acceptance, with 22% drop in enterprises that prohibit it

[November 14, 2012]

ISACA Survey: UK Workers Feel Online Privacy Is Threatened, But Gap Exists Between Fears and Actions; BYOD gains rapid acceptance, with 22% drop in enterprises that prohibit it

(M2 PressWIRE Via Acquire Media NewsEdge) London, UK -- Eight out of 10 UK consumers who use a computer, tablet PC or smartphone for work activities feel their online privacy is threatened, but many persist with actions and attitudes that put their privacy and security at risk, according to a survey of 1,000 UK office workers by global non-profit IT association ISACA. ISACA also conducted a separate survey of more than 4,500 of its members from 83 countries, including 980 in Europe. The majority of respondents say that the risk of Bring Your Own Device (BYOD) outweighs the benefits, yet year over year, but there has been a 22-point percentage drop in enterprises that prohibit BYOD. With the increasingly blurry line between work and personal devices, behaviours that put privacy and security at risk have the potential to impact enterprises.


Sharing information online is riskier than ever, say one-quarter of the respondents. And only 12% say they do not think their online privacy is threatened. Yet despite these concerns, UK consumers reported engaging in the following risky behaviour: 10% have clicked on links in email from people they did not know 16% have used the same passwords for work and shopping sites 20% have clicked on links from social media sites 23% have used their work email address for online shopping 8% have lost their work or personal device they used for work Employees' online activities pose a special challenge to employers during the holiday season, since 69% of survey participants plan to shop online during the holiday season of November and December. Of those, 27% will spend five hours or more shopping on a work device and nearly 10% will spend 10 hours or more. Additionally, 44% will spend five hours or more and 16% will spend 10 hours or more shopping on personal mobile devices also used for work--a practice called "bring your own device" (BYOD).

According to the UK consumer edition of ISACA's 2012 IT Risk/Reward Barometer, employees who have a work-supplied or BYOD device reported: To save 50 percent off a 100 item, 80% would be willing to reveal personal information; 59% would give up their email address, 20% would give up the name of the street they grew up on, 17% would provide their mother's maiden name, and 7% would even be willing to share their current social media password. 22% are more concerned with protecting the security of their personal devices than their work-supplied devices. 12% would be just as inclined to use their personal device for work purposes even if they knew their online activity could be tracked by their employer. "Using the same password for different sites will make it easier for criminals to hack into your accounts and compromise the data held by the organisation you work for. The more personal details you share about yourself online, the more likely you are to be a victim of social engineering attacks, especially with all of the data aggregators that combine seemingly innocent pieces of data into one comprehensive picture," said Ramss Gallego, CISM, CGEIT, CISSP, SCPM, CCSK, security strategist and evangelist at Quest Software -now part of Dell - and ISACA international vice president.

While a quarter (25%) of respondents feel that sharing information online has become riskier over the past year, 87% reported engaging in a range of potentially risky actions: 80% do not verify the security settings of online shopping sites. 22% assume their IT department is ensuring that their work-supplied device has the most recent security patches. 13% are not concerned that their personal online activities at work may affect their organization's IT network. 11% have clicked on a link in an email before confirming its authenticity. 9% used a cloud service like Dropbox or Google Docs for work documents without their company's knowledge. "The 2012 IT Risk/Reward Barometer shows that despite considerable concern about their online privacy and security, consumers are simply not willing to give up behaviour that is high-risk and could compromise their own and their employer's cash, data and reputation," said Marc Vael, CISA, CISM, CGEIT, CRISC, an international vice president of ISACA. "The survey shows a sizable gap between what people believe they should do and how they actually act. Given that 23% of employees in the UK now use their own personal devices for work purposes--devices over which the enterprise has limited control--companies need to advocate an embrace-and-educate approach. Embrace the technology, but provide ongoing training about the personal and enterprise risks and how to avoid them." 10,000 in lost productivity from employee holiday shopping online, predicts IT ISACA also conducted a separate survey of more than 4,500 of its members from 83 countries, including 159 in the UK. The enterprise will lose 10K or more in lost productivity as a result of an employee shopping online during work hours in November and December, say 29% percent of those surveyed. Over a third believe that employee will spend on average more than a full work day shopping online during work hours using a personal computer or smartphone, and 27% estimate they will spend more than a full day shopping from a work-supplied device.

Several of the "unsafe" actions consumers admitted taking were among the most worrisome to ISACA members--for example, storing work passwords on personal devices (77% say it poses a high risk to the enterprise) and using online file-sharing services like Google Docs or Dropbox for work documents (75%) were top two actions rated as high risk. In fact two-thirds of organisations prohibit using a file-sharing service for company documents and 40% prohibit using a personal mobile device for work purposes. The majority (59%) of respondents say that the risk of BYOD outweighs the benefits, yet year over year there has been a 22-point percentage drop in enterprises who prohibit BYOD (down from 66% to 44%).

About the 2012 IT Risk/Reward Barometer The annual IT Risk/Reward Barometer helps gauge attitudes and organizational behaviours related to the risk and reward associated with the blurring boundaries between personal and work devices (BYOD), cloud computing, and increased enterprise risk related to online employee behaviour at peak seasonal times.

The study is based on September 2012 online polling of 4,512 ISACA members from 83 countries, including 159 members in the UK. A separate online survey was fielded among 1,000 UK consumers by OnePoll from 23-25 October 2012. To see the full results, visit www.isaca.org/risk-reward-barometer.

About ISACA With more than 100,000 constituents in 180 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent ISACA hosts international conferences, publishes the ISACA Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control(TM) (CRISC(TM)) designations.

ISACA continually updates and expands the practical guidance and product family based on the COBIT framework. COBIT helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business.

Participate in the ISACA Knowledge Center: www.isaca.org/knowledge-center Follow ISACA on Twitter: https://twitter.com/ISACANews Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial Like ISACA on Facebook: www.facebook.com/ISACAHQ Contact: Kristen Kessinger, +1.847.660.5512 , news@isaca.org Hannah Rafferty, Eskenzi PR, +44 20 71 832 836 , hannah@eskenzipr.com ((M2 Communications disclaims all liability for information provided within M2 PressWIRE. Data supplied by named party/parties. Further information on M2 PressWIRE can be obtained at http://www.presswire.net on the world wide web. Inquiries to info@m2.com)).

(c) 2012 M2 COMMUNICATIONS

[ Back To SIP Trunking Home's Homepage ]

Loading
Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner


Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Making A Broadband Purchase Decision
Businesses today have many options for broadband connectivity. Clarifying your particular business needs prior to selecting a broadband provider will ensure an optimal match of broadband service to your requirements.

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Case Studies

Business Telecom Expenses Reduced 50%
A small to medium sized company in the midwest was interested in migrating to IP Communications, but in today's economy, they were hesitant to upgrade their communication system due to their perception that the cost would outweigh the benefits.

Multi-State Company Cuts Telecom Costs 50%
A multi-site, multi-state company with extensive monthly long distance fees and toll-free charges did not have adequate broadband for Broadvox SIP Trunking requirements, nor did they have a SIP enabled telephone system.

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?ces all over the country, the company spent a great deal of money every month just on internal phone calls.

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

Broadvox VAR Testimonial VAR 1:
Part 1 of the VAR (Value Added Reseller) Partner Program Testimonials for Broadvox...

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

Partner Program Overview:
Over 4,000 VARs, Master Agents, Solution Providers, and Independent IT Professionals trust Broadvox. We offer customized services and solutions to fit seamlessly into any company's business model. And when you partner with Broadvox, every member of our team stands behind you and your customers 100%...

SIP Trunk UC Summit

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.