Companies that don’t have a formal employee IT policy in place are taking big risks, according to a recent survey.
The survey polled 1,151 UK workers found that 38% of them had downloaded personal files onto their work devices, while 29% had installed personal apps.
A smaller, but no less troubling number of those surveyed said they used peer-to-peer file-sharing services such as BitTorrent (5%), or temporarily disabled their security software (4%).
The result of such risky behavior: 32% of devices used for both personal and work activities were corrupted to the point that data was unrecoverable!
If those numbers are raising some alarms, you should join us at DRI2015 for “Insider Threat Program: Protecting the Crown Jewels,” a featured session presented by Frank Slater, Director of Consulting Services with CGI. During this session, you’ll learn how to identify and protect your organization’s most critical data.
“Most people recognize that it’s a risk, but most companies underestimate the impact to their organization,” Slater said in an exclusive interview with DRI. “An attendee who’s interested has to know the threat is real, and imminent, and how to prepare.”
Click here to download the complete interview, where Slater breaks down the three major types of insider threat and how to approach data security in your organization. Then register for DRI2015 and make sure to catch this crucial session!