Feeds

Businesses blind to the security risks of temporary staff

Access without accountability

Top three mobile application threats

More than 80 per cent of temporary staff have the same level of access to company documents as permanent staff but without the same accountability, according to research released today by security firm Websense.

The survey of more than 100 temporary staff found that 88 per cent of respondents were able to access documents from the company network drive, 62 per cent had used someone else's login details to access a work PC, 52 per cent had used a co-worker's email account, and 81 per cent had unlimited access to the internet from their work PC.

A worrying level of apathy among businesses toward basic data security processes is leaving them wide open to the risk of accidental or deliberate data breaches, according to Websense. Only 21 per cent of temporary workers had signed any type of PC or web use policy.

Among the other findings, 91 per cent were able to print any work document they liked, and 37 per cent were given access to passwords for company systems like invoicing, procurement, and payroll. Forty-two per cent were able to connect a personal device like an iPod, USB key, or PDA to their work PC.

Websense says businesses are also failing to manage the use of social networking sites, which it described as "a haven for cyber criminals". The survey found that 67 per cent of temporary workers used social networking sites like Facebook during working hours and 21 per cent accessed peer-to-peer file-sharing sites.

Copyright © 2007, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.