Shockingly, in today’s modern workplace, employers seemingly turn their heads to e-risk management despite the consequences. Experts claim millions of dollars are lost in productivity, computer assets, credibility and customer confidence. Is someone really watching what employees click? The Internet in the workplace causes security risks because of employee misuse, lack of employer policy and inadequate firewall systems. Interestingly enough, less than half, 40% (Clearswift, 2003) of employers surveyed educate their employees about viruses. Since employees are rarely informed about the risks involved with Internet misuse, the number of e-risk incidences continue to rise. According to Bickford (2006) “many personal computer users feel they must install accessory programs that complicate the normal processes associated with the retrieval of web based information”; thus creating a technical support burden. Furthermore “most employers fail to see attacks as a people problem as well as a technical challenge.” Assurex and Clearswift (2003). With workplace internet use on the rise, many users have found ways to circumvent firewalls leaving employers susceptible to viruses and malware. In an effort to expedite communication in the workplace, many employers rely on e-mail and obtain information from databases containing personal consumer data. Most employers have written policies to regulate external email, as per Clearswift’s (2003) survey, only 48% actually enforce their policies with security software. Those that do enforce their policies also tend to have a double standard when it comes to executives. However, according to Tom Olzak(2010), “It isn’t just senior managers, however, who are targets.” and “When this double-standard exists, it presents a large attack surface to an attacker using a targeted approach.”. Additionally, Clearswift’s survey indicates that 19% of employers have battled lawsuits
References: Business not prepared for e-risks. (2003). Computer Security Update, 5 Bickford, D. (2006). Firewalls, ad-blockers, web accelerators, etc.: helping remote users of electronic resources overcome barriers to access. Journal of Library Administration, 45(3/4), 511-512. doi:10.1300/J111v45n03̱12 Olzak,T. (2010, June 28). What you need to know to survive targeted malware attacks. Tech Republic. Retrieved from http://www.techrepublic.com/blog/it-security/what-you-need-to-know-to-survive-targeted-malware-attacks/