Never Trust Anyone Under 30

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  20
Previous Next

Click through to see more findings from a recent survey by Cisco Systems.

Topics : Application Security, IT Process Management, Six Sigma


Cisco is sharing the results of a survey about the overall state of network security in the enterprise worldwide.

The survey – the results of which were announced in conjunction with the announcement of its partnership with other vendors to create validated secure borderless network systems – looked at the security processes of companies in the United States, Germany, China, India and Japan. Specifically, the survey delved into the IT security issues related to tracking vulnerabilities and policy enforcement in the corporate environment.

More than 500 IT decision makers from the five target countries took part in the survey. Interestingly, security in the United States, China and India is achieved using a multipronged approach, with companies incorporating more than one technology to track vulnerabilities. But despite the greater attention to security, respondents from these countries regularly find employees are using unauthorized devices or unsupported applications on their network, resulting in information loss.

Social networking was the largest offender, with 68 percent of respondents reporting unauthorized Facebooking (or other online socializing).

What may be the most telling findings, however, are those that show how important security issues are relative to hiring and keeping good employees. The survey reveals a feeling among its respondents, especially those in China and India, that overly strict security policies can have a negative impact on the hiring and retention of employees who are under the age of 30 – a whopping 71 percent, in fact.

And yet, more than half of the survey respondents said they would allow personal devices on the corporate network within the next year, despite the potential security risks.

Both of these statistics show that many IT decision makers are apt to turn a blind eye to seemingly non-threatening but nonetheless real security breaches in the name of employee satisfaction, especially those employees under 30. Do they think employees over 30 are the only population posing a security risk? What is it about employees under 30 that makes them immune to security policies and impervious to scrutiny?

I can understand that younger employees may be perceived to be more in tune with cutting-edge technologies, but that’s not always the case. Sometimes, experience is the greatest teacher. And experience is the one thing many of these under-30 employees lack.

It seems counterintuitive to implement tight security policies and turn around and ignore them to keep employees happy. Ensuring the security of corporate information should be the IT decision maker’s highest priority.

 

More Slideshows

IT_Man22-190x128 Eight Signs Your Team Is in Trouble

Eight common behaviors that team leaders should look for and address before they escalate into big organizational failures - lost contracts, missed deadlines, budget overruns, and the loss of key team members. ...  More >>

Logicalis7StepITSM0x Seven Steps to an Effective ITSM Strategy

While organizations may have some or even all of the dots, to have a fully functioning ITSM strategy, the CIO has to connect them together in a meaningful way. ...  More >>

1EVacationTips0x Six Tips for CIOs Preparing for Vacation

With summer officially in full force, it’s not always easy to disconnect from the office, especially if you’re running the IT department. Here are tips that can help provide peace of mind while you're away. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.