Feeds

Businesses blind to the security risks of temporary staff

Access without accountability

New hybrid storage solutions

More than 80 per cent of temporary staff have the same level of access to company documents as permanent staff but without the same accountability, according to research released today by security firm Websense.

The survey of more than 100 temporary staff found that 88 per cent of respondents were able to access documents from the company network drive, 62 per cent had used someone else's login details to access a work PC, 52 per cent had used a co-worker's email account, and 81 per cent had unlimited access to the internet from their work PC.

A worrying level of apathy among businesses toward basic data security processes is leaving them wide open to the risk of accidental or deliberate data breaches, according to Websense. Only 21 per cent of temporary workers had signed any type of PC or web use policy.

Among the other findings, 91 per cent were able to print any work document they liked, and 37 per cent were given access to passwords for company systems like invoicing, procurement, and payroll. Forty-two per cent were able to connect a personal device like an iPod, USB key, or PDA to their work PC.

Websense says businesses are also failing to manage the use of social networking sites, which it described as "a haven for cyber criminals". The survey found that 67 per cent of temporary workers used social networking sites like Facebook during working hours and 21 per cent accessed peer-to-peer file-sharing sites.

Copyright © 2007, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Website security in corporate America

More from The Register

next story
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
OECD lashes out at tax avoiding globocorps' location-flipping antics
You hear that, Amazon, Google, Microsoft et al?
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.