May 29, 2015 By Shane Schick 2 min read

CISOs probably didn’t need to see recent statistics to know that employees continue to take major cybersecurity risks, but the numbers are a grim reminder of the education and training necessary to fend off potential attacks.

According to a Blue Coat Systems report conducted by research firm Vanson Bourne, 4 out of 5 of the more than 1,500 people surveyed said they routinely take cybersecurity risks. This included clicking on links within possibly malware-laden email messages, using personal rather than corporate-issued mobile devices in the office, deploying unauthorized software or even looking at adult content on workplace machines. Only 20 percent said they never did any of these things, the study said.

It’s not like awareness of cybersecurity risks is at an all-time low. As CSO Online pointed out, many survey respondents acknowledged the dangers of opening email attachments they didn’t expect, and it’s no surprise that employees in the IT department tended to score better in awareness than their peers in other departments. From an industry sector perspective, however, it was alarming to see that those employed by tech companies tended to be among those most likely to do things that put their firm’s data security at risk.

To some extent, employees may be more likely to take cybersecurity risks because they have more opportunity to do so. Technologies such as software applications that were once only within the domain of IT departments to procure and deploy are now accessible by almost anyone, an expert told iTWire. It may be increasingly difficult for some firms to strike a balance between offering employees choices and flexibility from an IT perspective while also safeguarding mission-critical systems and data.

Although eWEEK suggested companies could work harder to set policies to mitigate cybersecurity risks, there aren’t a lot of great ideas on how best to enforce them. Viewing online content at work might lead to serious repercussions, of course, but should downloading an app without the IT department’s permission be an offense worthy of termination? What about using social media, where cybercriminals might manipulate the user’s emotions to scam money, data or worse? That’s the real challenge for CISOs. If nothing else, the study means that whatever solutions they propose, they’ll have some good numbers to back them up.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today