Preview

Brainia Essay FirstDraft

Good Essays
Open Document
Open Document
601 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Brainia Essay FirstDraft
The Underlying Problem with Internet Abuse in the Workplace
Shockingly, in today’s modern workplace, employers seemingly turn their heads to e-risk management despite the consequences. Experts claim millions of dollars are lost in productivity, computer assets, credibility and customer confidence. Is someone really watching what employees click? The Internet in the workplace causes security risks because of employee misuse, lack of employer policy and inadequate firewall systems. Interestingly enough, less than half, 40% (Clearswift, 2003) of employers surveyed educate their employees about viruses. Since employees are rarely informed about the risks involved with Internet misuse, the number of e-risk incidences continue to rise. According to Bickford (2006) “many personal computer users feel they must install accessory programs that complicate the normal processes associated with the retrieval of web based information”; thus creating a technical support burden. Furthermore “most employers fail to see attacks as a people problem as well as a technical challenge.” Assurex and Clearswift (2003). With workplace internet use on the rise, many users have found ways to circumvent firewalls leaving employers susceptible to viruses and malware. In an effort to expedite communication in the workplace, many employers rely on e-mail and obtain information from databases containing personal consumer data. Most employers have written policies to regulate external email, as per Clearswift’s (2003) survey, only 48% actually enforce their policies with security software. Those that do enforce their policies also tend to have a double standard when it comes to executives. However, according to Tom Olzak(2010), “It isn’t just senior managers, however, who are targets.” and “When this double-standard exists, it presents a large attack surface to an attacker using a targeted approach.”. Additionally, Clearswift’s survey indicates that 19% of employers have battled lawsuits



References: Business not prepared for e-risks. (2003). Computer Security Update, 5 Bickford, D. (2006). Firewalls, ad-blockers, web accelerators, etc.: helping remote users of electronic resources overcome barriers to access. Journal of Library Administration, 45(3/4), 511-512. doi:10.1300/J111v45n03̱12 Olzak,T. (2010, June 28). What you need to know to survive targeted malware attacks. Tech Republic. Retrieved from http://www.techrepublic.com/blog/it-security/what-you-need-to-know-to-survive-targeted-malware-attacks/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79-98…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Virtually every business today uses at least one form of computer information technology. Business firms use computers to automate and assist in managing everything from operations, sales, finance, and logistics. Internal databases and intranets are used for internal controls and organizations are connected via the internet to conduct sales, marketing and many other communications and transactions. Electronic business, or e-business, is dominating modern markets and the business world. This new world of technological innovation has exponentially increased efficiency and globalized the world’s economies. Unfortunately criminals still exist and continue to exploit businesses, committing acts of theft, vandalism, and terror. E-business is not immune to criminal mischief and in fact can be quite vulnerable to sophisticated cyber criminals known as hackers. In early 2008 it was reported that the North East Supermarket mogul, Hannaford Bros. Company fell victim to a computer hacking attack that compromised approximately 4.2 million customer credit cards. This act created a financial nightmare for thousands of consumers and for the Hannaford Bros. grocery company. The incident was a black mark on Hannaford’s public image and a financial burden to their corporation. Cyber Security is a growing priority of today’s business leadership. Boon, Kurtz (2011)…

    • 1647 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    As email is electronic it means that it is very easy for organisations to monitor the use of email. It is even possible to monitor employees’ use of email without their knowledge. An organisation may choose to monitor staff use of email to protect the company’s image and reputation. Employers could argue that they have the right to information about their employees use of a work tool. Employees could argue that monitoring their email is a violation of their right to privacy. Hence, electronic monitoring of employees email use is a very contentious issue that raises ethical dilemmas for an organisation.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Internet and the Workplace

    • 1937 Words
    • 8 Pages

    However, in addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes, employees are also using the Internet for personal use, whether for sending personal e-mail messages, playing games, downloading pornography, ordering goods online, checking stock prices, or gambling. Accordingly, many issues have come to light involving employee e-mail and Internet use. Employers have to question how much, if any, personal use of the Internet and e-mail to permit in the workplace. Employers are also grappling with the question of whether to monitor Internet use and whether to block access to certain…

    • 1937 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Cyber security has been slowly taking over as the main concern for security professionals as well as organizations. This is due to a larger emphasis on using paperless methods in order to keep track of customer’s data, financial records as well as many other important documents. Without properly trained IT professionals as well as an increase in maintaining up to date security these attacks will continue to have success. Another issue is the lack of legislation regarding cyber crime and their perpetrators.…

    • 649 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Slacking

    • 287 Words
    • 2 Pages

    Whether it is called cyber slacking, computer gold-bricking, cyberloafing, or any of the other dozens of nicknames that have surfaced over the last decade, surfing the web for personal use during work time is a world-wide problem. It is so common these days that many people won’t think twice about surfing the web for personal use, but according to the International Association for Computer Information Systems (2009), cyber slacking costs American businesses $54 billion and 30-40% of productivity losses every year.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Web Surfing

    • 470 Words
    • 2 Pages

    Internet is essential in people’s life, and internet surfing is very popular nowadays. Nevertheless, office workers may be fire due to surfing on the internet in workplace. It is not a valid reason to fire an employee since Internet surfing has three positive influences on office workers.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays