Feeds

IT managers caught in employees' illicit networks

IM, VoIP create biz security risk

Securing Web Applications Made Simple and Scalable

Illicit workplace "greynets" are enjoying enormous growth, with staff embracing the concept while BOFHs are left playing whac-a-mole.

The FaceTime survey, of 700 US employees and IT managers, found an average of nine greynets in every company, with only one per cent of firms avoiding them completely.

We used to call them peer-to-peer applications, downloaded apps that connect direct to other users to exchange messages and/or data, but apparently the hip moniker of Instant Messaging, VoIP and filesharing applications, is "greynet" these days.

All this grey activity is providing a great conduit for malware, and IT managers report spending an average of $289,000 on fixing greynet-transported security breaches, compared to $130,000 last year.

Eighty-six per cent of BOFHs don't like IM, though 45 per cent of companies do have IM monitoring in place. Eighty-five per cent of employees admit using their work computer for personal stuff.

More worrying for the BOFH is that 36 per cent of employees believe they have the right to install any application they like on their desktop computer, regardless of IT department approval.

Luckily, while most employees believe they have the right to install applications, the managment systems already available to the average BOFH make that impossible, and with that capability expanding to Windows Mobile there's still plenty of opportunity to keep users under control. ®

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.