Groups Similar Look up By Text Browse About

Similar articles
Article Id Title Prob Score Similar Compare
215649 ZDNET 2021-9-10:
IT leaders facing backlash from remote workers over cybersecurity measures: HP study
1.000 Find similar Compare side-by-side
215661 VENTUREBEAT 2021-9-9:
IT teams face employee resistance to security controls
0.852 0.796 Find similar Compare side-by-side
215782 ZDNET 2021-9-9:
91% of IT teams have felt 'forced' to trade security for business operations
0.884 0.761 Find similar Compare side-by-side
215783 TECHREPUBLIC 2021-9-9:
WFH is a cybersecurity "ticking time bomb," according to a new report
0.828 0.755 Find similar Compare side-by-side
215648 TECHREPUBLIC 2021-9-10:
Remote cybersecurity concerns and labor shortages are front and center in a new small business report
0.729 0.477 Find similar Compare side-by-side
215988 VENTUREBEAT 2021-9-11:
Only 8% of orgs with web apps for file uploads have adequate cybersecurity
0.403 Find similar Compare side-by-side
216056 TECHREPUBLIC 2021-9-13:
Protect your endpoints with top EDR software
0.389 Find similar Compare side-by-side
215654 VENTUREBEAT 2021-9-8:
How organizations can improve security operations
0.381 Find similar Compare side-by-side
215454 ZDNET 2021-9-8:
Of course we were prepared for the pandemic, say modest, honest IT pros
0.364 Find similar Compare side-by-side
215877 VENTUREBEAT 2021-9-13:
The IT talent gap is still growing
0.364 Find similar Compare side-by-side
216076 ZDNET 2021-9-13:
Fortinet, Linksys joint venture aims to bring enterprise security to home offices
0.362 Find similar Compare side-by-side
215668 TECHREPUBLIC 2021-9-9:
Malicious office documents: The latest trend in cybercriminal exploitation
0.359 Find similar Compare side-by-side
215817 ZDNET 2021-9-13:
The shortage of tech workers is about to become an even bigger problem for everyone
0.344 Find similar Compare side-by-side
215616 ZDNET 2021-9-9:
Phishing attacks: One in three suspect emails reported by employees really are malicious
0.336 Find similar Compare side-by-side
215865 VENTUREBEAT 2021-9-13:
Tenable acquires infrastructure-monitoring startup Accurics
0.333 Find similar Compare side-by-side
215493 TECHREPUBLIC 2021-9-7:
Study: The "robots are coming to take our jobs" worry is overblown
0.330 Find similar Compare side-by-side
215781 TECHREPUBLIC 2021-9-8:
Enhancing cybersecurity skills for the entire workforce must be a priority for cyber-resilience
0.325 Find similar Compare side-by-side
216037 TECHREPUBLIC 2021-9-10:
Your voiceprint could be your new password as companies look to increase security for remote workers
0.321 Find similar Compare side-by-side
216052 TECHREPUBLIC 2021-9-13:
5 ways to better prepare your organization for a ransomware attack
0.316 Find similar Compare side-by-side
216090 ZDNET 2021-9-13:
Brazil debates creation of national strategy to tackle cybercrime
0.313 Find similar Compare side-by-side
216080 ZDNET 2021-9-13:
Remote work is making productivity and innovation harder, says Microsoft study
0.311 Find similar Compare side-by-side
215855 VENTUREBEAT 2021-9-13:
CyberSaint Recognized in Three Gartner® Hype Cycle™ Reports
0.303 Find similar Compare side-by-side
215697 ZDNET 2021-9-10:
Turbocharge your IT career with this cybersecurity training that is on sale for just $30
0.300 Find similar Compare side-by-side
215684 VENTUREBEAT 2021-9-9:
86% of businesses think a centralized team should manage multilingual efforts
0.299 Find similar Compare side-by-side
216002 VENTUREBEAT 2021-9-12:
Zero-trust security could reduce cyber trust gap
0.296 Find similar Compare side-by-side


ID: 215649


Date: 2021-09-10

IT leaders facing backlash from remote workers over cybersecurity measures: HP study

More than 30% of workers under the age of 24 admitted to outright bypassing certain corporate security policies to get work done. A new study from HP has highlighted the precarious -- and often contentious -- situations IT teams are facing when trying to improve cybersecurity for remote workers.  The new Rebellions & Rejections report from HP Wolf Security surveyed 1100 IT decision-makers and also gleaned insights from a YouGov online survey of 8443 office workers who now work from home.  The study found that IT workers often feel like they have no choice but to compromise cybersecurity in order to appease workers who complain about how certain measures slow down business processes. Some remote workers -- particularly those aged 24 and younger -- outright reject cybersecurity measures they believe "get in the way" of their deadlines.  More than 75% of IT teams said cybersecurity took a "backseat to business continuity during the pandemic," and 91% reported feeling pressured into compromising security for business practices.  Nearly half of all office workers under the age of 24 said cybersecurity tools were "a hindrance", and 31% admitted to outright bypassing certain corporate security policies to get work done.  Unfortunately, almost half of the office workers of all ages believe cybersecurity measures waste their time, and the figure increases to 64% among those under the age of 24. The survey found that 54% of 18-24-year-olds cared more about their deadlines than causing a data breach.  Researchers found that 39% of respondents did not fully know what their organization's security policies are, causing 83% of all IT workers surveyed to call remote work a "ticking time bomb" for data breaches.  Remote working 101: Professional's guide to the tools of the trade Mastering remote work is all about finding the right tools to stay productive and connected. This guide will have you and your team synchronized and working in harmony, wherever you happen to be. Read More Ian Pratt, global head of security for personal systems at HP, said the fact that workers are actively circumventing security should be a worry for any CISO.  "This is how breaches can be born," Pratt said. "If security is too cumbersome and weighs people down, then people will find a way around it. Instead, security should fit as much as possible into existing working patterns and flows with unobtrusive, secure-by-design and user-intuitive technology. Ultimately, we need to make it as easy to work securely as it is to work insecurely, and we can do this by building security into systems from the ground up." IT leaders have had to take certain measures to deal with recalcitrant remote workers, including updating security policies and restricting access to certain websites and applications.  But these practices are causing resentment among workers, 37% of whom say the policies are "often too restrictive." The survey of IT leaders found that 90% have received pushback because of security controls, and 67% said they get weekly complaints about it.  More than 80% of IT workers said, "trying to set and enforce corporate policies around cybersecurity is impossible now that the lines between personal and professional lives are so blurred", and the same number of respondents said security had become a "thankless task. "  Nearly 70% said they were viewed as "the bad guys" because of the restrictions they impose to protect workers.  "CISOs are dealing with increasing volume, velocity and severity of attacks. Their teams are having to work around the clock to keep the business safe while facilitating mass digital transformation with reduced visibility," said Joanna Burkey, HP's CISO. " Cybersecurity teams should no longer be burdened with the weight of securing the business solely on their shoulders; cybersecurity is an end-to-end discipline in which everyone needs to engage." Burkey added that IT teams need to engage and educate employees on the growing cybersecurity risks while understanding how security impacts workflows and productivity.  Cybersecurity experts like YouAttest CEO Garret Grajek said every new access method, user pool and technology adds attack vectors and vulnerabilities for hackers.  "We just saw that even the best WFH plans might be vulnerable w/ over 500k of Fortinet VPN users being exposed," Grajek noted. "As with the other attack vectors, enterprises have to assume they will be breached and then ensure that rogue users access and actions are mitigated or limited."