{"id":3507,"date":"2017-04-20T23:35:10","date_gmt":"2017-04-21T03:35:10","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3507"},"modified":"2017-04-20T23:35:10","modified_gmt":"2017-04-21T03:35:10","slug":"users-overshare-sensitive-enterprise-data","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/04\/20\/users-overshare-sensitive-enterprise-data\/","title":{"rendered":"Users Overshare Sensitive Enterprise Data"},"content":{"rendered":"<p>A newly released Dell End-User Security Survey showed that even employees with information security education and training could engage in risky security practices. According to the survey, a good news is that 76% of employees feel their company prioritized security rather than productivity, and two out of three employees are trained, but 18% of them still engaged in unsafe security practices, and 24% of them did not care because they thought it is unavoidable for productivity. They also found that 72% of employees are willing to share confidential, sensitive, or regulated information with others under certain circumstances, and 35% think it&#8217;s common to see workers leaving with corporate information when they leave an organization. I think there are two problems, the first one is that balance of security and productivity. For productivity, employees would share data with each other or skip over some security steps to complete tasks more effectively. The second problem is that employee security training is not very effective so that employees still have bad security practices and habits. Organizations should realize that the security training must be continuous to create a security culture so that employees can always be aware that security has more priority than productivity.<\/p>\n<p>Link: <a href=\"http:\/\/www.darkreading.com\/endpoint\/users-overshare-sensitive-enterprise-data\/d\/d-id\/1328689\">http:\/\/www.darkreading.com\/endpoint\/users-overshare-sensitive-enterprise-data\/d\/d-id\/1328689<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A newly released Dell End-User Security Survey showed that even employees with information security education and training could engage in risky security practices. According to the survey, a good news is that 76% of employees feel their company prioritized security rather than productivity, and two out of three employees are trained, but 18% of them [&hellip;]<\/p>\n","protected":false},"author":11323,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[717573],"tags":[],"class_list":{"0":"post-3507","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-13-disaster-recovery-business-continuity","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8j0Bl-Uz","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/11323"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3507"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3507\/revisions"}],"predecessor-version":[{"id":3508,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3507\/revisions\/3508"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}