Feeds

Businesses blind to the security risks of temporary staff

Access without accountability

3 Big data security analytics techniques

More than 80 per cent of temporary staff have the same level of access to company documents as permanent staff but without the same accountability, according to research released today by security firm Websense.

The survey of more than 100 temporary staff found that 88 per cent of respondents were able to access documents from the company network drive, 62 per cent had used someone else's login details to access a work PC, 52 per cent had used a co-worker's email account, and 81 per cent had unlimited access to the internet from their work PC.

A worrying level of apathy among businesses toward basic data security processes is leaving them wide open to the risk of accidental or deliberate data breaches, according to Websense. Only 21 per cent of temporary workers had signed any type of PC or web use policy.

Among the other findings, 91 per cent were able to print any work document they liked, and 37 per cent were given access to passwords for company systems like invoicing, procurement, and payroll. Forty-two per cent were able to connect a personal device like an iPod, USB key, or PDA to their work PC.

Websense says businesses are also failing to manage the use of social networking sites, which it described as "a haven for cyber criminals". The survey found that 67 per cent of temporary workers used social networking sites like Facebook during working hours and 21 per cent accessed peer-to-peer file-sharing sites.

Copyright © 2007, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.