Feeds

IT managers caught in employees' illicit networks

IM, VoIP create biz security risk

The Power of One Brief: Top reasons to choose HP BladeSystem

Illicit workplace "greynets" are enjoying enormous growth, with staff embracing the concept while BOFHs are left playing whac-a-mole.

The FaceTime survey, of 700 US employees and IT managers, found an average of nine greynets in every company, with only one per cent of firms avoiding them completely.

We used to call them peer-to-peer applications, downloaded apps that connect direct to other users to exchange messages and/or data, but apparently the hip moniker of Instant Messaging, VoIP and filesharing applications, is "greynet" these days.

All this grey activity is providing a great conduit for malware, and IT managers report spending an average of $289,000 on fixing greynet-transported security breaches, compared to $130,000 last year.

Eighty-six per cent of BOFHs don't like IM, though 45 per cent of companies do have IM monitoring in place. Eighty-five per cent of employees admit using their work computer for personal stuff.

More worrying for the BOFH is that 36 per cent of employees believe they have the right to install any application they like on their desktop computer, regardless of IT department approval.

Luckily, while most employees believe they have the right to install applications, the managment systems already available to the average BOFH make that impossible, and with that capability expanding to Windows Mobile there's still plenty of opportunity to keep users under control. ®

Reducing security risks from open source software

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.