Feeds

US firms use own staff to snoop on co-workers

(Office)spy versus spy

Internet Security Threat Report 2014

The UK may have more CCTV cameras than anywhere else in the world but US workers are kept under even closer tabs over internet use at work, according to a new survey.

Two in five (41 per cent) of large US firms pay staff to either read or analyse the contents of outbound emails. One in four (26 per cent) of the 300 US firms surveyed by email security outfit Proofpoint said they had sacked someone for violating email policies over the last 12 months.

Email was by no means the only source of data leakage or risk to corporate reputation. Many US corporations disciplined their staff over misuse of web 2.0 communications media such as blogs, message boards and media sharing sites.

Eleven per cent of US firms quizzed said they had disciplined workers for improper use of either blogs or message boards. A similar 13 per cent of companies had cause to read the riot act to workers over misuse of social networking sites. Improper use of media sharing sites led to disciplinary action at 14 per cent of the firms quizzed.

One in four (27 per cent) of the firms polled had investigated the exposure of confidential, sensitive or private information from lost or stolen mobile devices in the past 12 months. The exposure of sensitive financial information (such as unannounced financial results) on blogs or message board postings resulted in disciplinary actions at 14 per cent of publicly traded firms surveyed by Proofpoint.

Proofpoint's survey, Outbound Email and Data Loss Prevention in Today’s Enterprise, can be downloaded here (registration required). ®

Intelligent flash storage arrays

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.