Security Awareness Research 5 November 2010

Size: px
Start display at page:

Download "Security Awareness Research 5 November 2010"

Transcription

1 Security Awareness Research 5 November % of data breaches happen as a result of frustrations with IT security policy restricting employees from doing their job

2 Foreword I am delighted to introduce this global research project which Clearswift has undertaken to examine IT security policies within businesses. This report follows on from the hugely successful series of reports published in April 2010 examining corporate attitudes towards Web 2.0 technologies, and the use of such tools in the workplace. Richard Turner Chief Executive The results of the original research illustrated a significant mind shift amongst businesses, making it clear that businesses now accept that Web 2.0 and other collaborative technologies are critical to the future success of their company. But as the corporate IT landscape becomes ever more complex, undergoing rapid changes as a result of the impact that Web 2.0 technologies have had, how prepared are companies, and more importantly, their staff, to cope with the ensuing security challenges? This new research moves on to examine attitudes towards IT policies in companies around the world, and the results are both fascinating and thought-provoking. One particularly interesting finding is the apparent lack of training of employees when it comes to IT policies many staff report only receiving training when they first join a company, and with technology changing so rapidly, this clearly isn t ideal. The reality is that staff can be a vital component for safeguarding data and information security within a business. Ensuring staff know and understand policies can be a huge advantage to companies. IT security companies have for too long made a living out of making their customers feel insecure, trading on fear and negativity to maximise profit. It is clear to me that in order to be more secure, companies must first stop feeling insecure. My overarching message as a result of this report is simple IT security must be brought out of the dark depths of the IT department and given clarity across the organisation. By having a relevant and current security policy in place, a company is enabling its employees to get on with the jobs that they need to do and aiding productivity and innovation.

3 Key Stats 71% of office workers say company has clear Internet policy that most employees understand 50% of office workers have discussed Internet policy with colleagues in the last 12 months, but only 29% have received training on the subject during this time 22% do not know if their Internet use is monitored at work Only 15% of office workers are concerned that they may be inadvertently breaching security policy but security breaches are most likely to be attributed to ignorance / lack of understanding (63%) Results of the Clearswift Security Awareness Survey are based on 2000 online interviews with office workers in UK, USA, Australia, Germany and Netherlands. The research was conducted by Loudhouse, an independent market research consultancy based in London Summary As technology for sharing information becomes more and more embedded in our lives, it becomes more and more important for those with access to data in the workplace to understand what uses of data are permitted and which activities may be putting data at risk. The Clearswift Security Awareness Survey explores the extent to which office workers understand the data security implications of their day-to-day activities and highlights an interesting data security phenomenon amongst office workers. It appears that employees in office environments have a misplaced confidence in their own levels of understanding and are not always equipped with the knowledge they need to keep data safe. As such, data security can be regarded as an unknown unknown workers who think they understand data protection are not aware that they need more information and guidance. Overconfidence can therefore be seen as the main data protection hazard in today s office environments. Employees are confident that they understand what is safe and what is permitted, which is leading many to take a casual attitude toward IT generally, often freestyling and blindly moving data from place to place without consideration of potential security risks. This situation is being compounded by the fact there is a lack of consistent communication about security policy, and consequently many office workers do not understand it fully. Despite the fact that the majority of office workers in this survey consider themselves to be risk-averse, individually and collectively they are inadvertently leaving their employers exposed to data security risks. In order to drive best practice in data security, Clearswift advises employers to actively engage their employees in a dialogue about security, responsibility, and risk. technology for sharing information becomes more and more embedded in our lives

4 Policy in practice With Internet use a ubiquitous part of working life for many, it is not surprising that most employers now have internet policies in place. Indeed, 71% claim that not only does their employer have such a policy, but that most of their fellow employees understand the policy which is in place. Only 20% say their company has no official policy at all. Furthermore, these policies for the most part are considered by employees to be fair and comprehensible only 10% see their employers rules as unfair, and only 8% feel employer policy makes no sense. Despite the existence of Internet policies and high reported levels of understanding of such policies amongst office workers, formalised communications around Internet policies are non-existent at worst, patchy at best. Whilst Internet use policy may be a topic of water cooler conversation, Figure 2 shows that half of office workers (50%) have had a conversation about Internet use policy in the last 12 months. In contrast, only 29% have had a dedicated training session on the policy within that time, and only 14% have raised a query to see if something they were doing was permitted under company policy. Indeed, half of respondents have never had a dedicated training session on their current company s security policy. Indeed, 38% have had no training at all about security issues in their current job (whether in a dedicated session or otherwise.) This suggests that even those who have had some training (at an induction or a scheduled session), are not provided with up-to-date information as they move through their organisations. Employees feel that their companies are being proactive about security 58% believe that their employer proactively encourages employees to understand and implement the policies they have, and generally see the policies as well-intentioned, but it is clear that the gap between good intentions and concrete action is large for many employers. Figure 1: Existence and understanding of company Internet policy Figure 2: Communication about Internet security Company has clear Internet policy / most employees do not understand policy, 9% Company has guidelines on Internet use but not enforced policy, 17% Company has no policy / guidelines on employee Internet use, 3% % in last 12 months... Discussed Internet use policy with colleagues 50% Received info about company security policies via Started using new software or hardware tools at work Have had dedicated training session on company security policy Consulted IT support about issue involving security tools Raised query about whether something I did online permitted under company s policy Warned informally by manager/colleague that something I did online might not be permitted 8% 14% 29% 28% 49% 46% Company has clear Internet policy / most or all employees understand policy, 71% employees understand the policy which is in place

5 Compliance confusion The majority of office workers claim general understanding of their employers internet policies, but many still experience confusion about aspects of that policy. Monitoring of internet use at work is the largest area of confusion: 21% say that their employer s electronic monitoring is the single most confusing aspect of using the internet at work. Figure 3 shows that over 1 in 5 office workers (22%) does not know if their internet use is being monitored at work. Of those (57%) who know that their internet use at work is monitored, 38% feel that their employer accesses information about personal internet use more than is necessary to maintain security. As one respondent put it No-one knows exactly who sees the Internet activity and what sort of information is on the reports, how often it is looked at and shared. Levels of office worker understanding of data security issues are shown in Figure 4. Confidence is highest in understanding what data can be sent via (79% are confident), what it is okay to do on work related social media (65%) and lower for understanding the security on work (52%). Other areas of employee data security confusion relate to the following: Who has access to data about my Internet use at work What data I can share with people in other functions and departments What data I am allowed to share outside work What I can say about work to others Who I can communicate with when I am at work Figure 3: Internet monitoring at work My use of the Internet at work is monitored electronically by my employer Don t know, 22% Figure 4: Employee confidence around data security issues Extremely confident Confident Neutral Not very confident Not at all confident No, 21% Yes, 57%...what data loss prevention means in the context of my work...the security on my work - if I make a mistake, the software will prevent incorrect use of data...what my company can see when I use personal or social media at work...what it is OK to do on work-related social media (work accounts on Facebook, Twitter, etc.)...what data can be sent via 34% 27% 25% 8% 27% 25% 30% 10% 9% 35% 24% 24% 9% 7% 42% 23% 18% 7% 8% 48% 31% 16% 3% 38% feel employer doesn t access information about personal online activity more than necessary to maintain security 1 in 5 (22%) feel employer accesses personal online activity more than necessary to maintain security Monitoring of internet use at work is the largest area of confusion

6 Casual compliance Interestingly, although personal levels of data security confidence are high only 15% of office workers are concerned that they may be inadvertently breaching company security policy through their use of the Internet - 63% of office workers attribute most security breaches to ignorance or a lack of understanding [Figure 5]. It seems therefore that office workers have a tendency to rate their own level of understanding of data security issues as higher than everyone else s! It is also worth noting that 1 in 5 people think security breaches occur in order to get jobs done efficiently or effectively, whilst 11% think they are down to frustrations with unrealistic IT security policy. Part of the problem appears to stem from an attitude of casual compliance. Office communications can be likened to a game of Chinese whispers with half of office workers (50%) reporting that there are informal rules about the internet at work, and that most people understand what s acceptable, regardless of what the official policy says [Figure 6]. Without training and consistent, up-to-date communication on company policy, lines between these informal standards and actual policy are being blurred and company data is being left exposed. With only 27% of office workers thinking that their company could be better at communicating its online security policy, it seems that security is off the radar for many people and not a top-of-mind concern in their day-to-day rush to get their jobs done. Patchy levels of confidence around data security issues only serve to paint a picture of misplaced confidence amongst both employees and employer and to highlight the need for security policy to be more fully and more frequently communicated by employers. Figure 5: Reason why IT security gets breached Figure 6: Casual compliance amongst office workers % agreeing (rating 4 or 5) Malicious intent 6% Frustrations with unrealistic IT security policy 11% I am confident that I understand my employer s policies about online activity I feel I understand which parts of my at-work internet use are visible to my employer There are informal rules about the Internet at my work - people know what s okay regardless of what the official policy says My company could be better at communicating its online security policy I am concerned that I may be inadvertently breaching company security policy through my use of the Internet 15% 27% 50% 56% 74% To get their jobs done more efficiently / effectively 20% Ignorance / lack of understanding 63% 1 in 5 people think security breaches occur in order to get jobs done efficiently or effectively

7 IT free-styling Office workers around the world are using a range of technologies in order to do their jobs and manage their personal lives. The boundaries between work and home use and appropriate and inappropriate use of technology are ever-shifting and essentially unclear. Figure 5 shows just some examples of where office workers are essentially IT free-styling, applying their own rules to technology use, regardless of what official policy says. 44% of office workers report storing data at work on personal memory devices, 39% download software to their computer at work and 25% use personal accounts on social networks to comment about their job. As one respondent put it I access my personal accounts and also do shopping during my lunch hour. I m hoping that no-one can see my card details or read my s. Most of the online activity during the day is likely personal, since only 14% use social media for work purposes (i.e., contributing to Facebook, Twitter, LinkedIn, or another social site as part of their job descriptions). still dominates work communication, and much of this is hosted in the cloud, raising security issues of which employees may not be aware. 74% frequently use and other web-based mediums to communicate with customers or clients about business. In short, office workers are using a variety of technologies, at varying levels of risk on a regular basis. The fact that office workers remain confident that they are compliant with data security policy in the absence of formalised training around such issues is a cause for concern. This situation is clearly untenable in the long term as data protection threats become more diverse and sophisticated, technology becomes more mobile and the lines between personal and work lives continue to blur. Figure 7: Examples of IT freestyling % doing at work at least sometimes Store data on work memory devices 46% Store data on personal memory devices 44% Download software to my computer Use personal accounts on social networks to comment about my job Use social networking sites in a professional capacity 25% 23% 39% Use media sharing sites in a professional capacity 20% office workers are essentially IT free-styling

8 Summing up It is clear that, whilst employees are confident that they understand their employers security policies this confidence is often unwarranted. Knowledge is too often transmitted informally, through conversations between employees, and hardened into informal guidelines that can supersede actual data protection policies in the absence of training. IT freestyling blurs the lines between personal and work technology, creating risks as sensitive work data is stored on personal USB sticks and personal information feeds through work laptops. This situation is risky in the long run, to both employers (who may suffer the consequences when workers break the rules) and to employees (who may inadvertently be revealing personal information through workplace monitoring or opening themselves up to career risk.) There are high levels of goodwill within organisations, however, and this creates the chance for outreach to close the security gap. The most forward-thinking organisations will need to close security gaps by acting on two problems at once. Technological solutions can help keep data under control, by automating enforcement and limiting risk. More regular training is needed alongside these solutions however, if employees are to feel confident about acting to protect sensitive data at work. Contact Clearswift United States Clearswift Corporation 161 Gaither Drive Centerpointe Suite 101Mt. Laurel, NJ Tel: Fax : United Kingdom 1310 Waterside, Arlington Business Park, Theale, Reading, Berkshire, RG7 4SA Tel: +44 (0) Fax: +44 (0) Australia Level 5, Suite 504, 165 Walker Street, North Sydney, New South Wales, 2060 Tel : Fax : Spain Cerro de los Gamos 1, Edif Pozuelo de Alarcón, Madrid Tel: / Fax: Germany Amsinckstrasse 67, Hamburg Tel: Fax: Japan Hanai Bldg. 7F, 1-2-9, Shiba Kouen Minato-ku Tokyo Tel : +81 (3) Fax : +81 (3)

Essential Steps to Web Security. A Clearswift Best Practice Guide

Essential Steps to Web Security. A Clearswift Best Practice Guide Essential Steps to Web Security A Clearswift Best Practice Guide Introduction Web 2.0 brings Threat 2.0 The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online

More information

Web 2.0 in the Workplace Today

Web 2.0 in the Workplace Today Web 2.0 in the Workplace Today 2 Contents Foreword 3 Employers enthusiastically embracing potential of Web 2.0 4 Brave new world 5 Web 2.0 and security: new approach needed? 7 Clearswift SECURE Gateways

More information

SECURE Web Gateway Sizing Guide

SECURE Web Gateway Sizing Guide Technical Guide Version 02 26/02/2015 Contents Introduction... 3 Overview... 3 Example one... 4 Example two... 4 Maximum throughput... 4 Gateway Reporter... 4 Gateway Reporter server specification... 5

More information

Securing Microsoft Office 365

Securing Microsoft Office 365 Securing Microsoft Office 365 Critical Information Protection for Hosted Email Services Microsoft Office 365 has captured the corporate imagination, but can you be sure that its security features are delivering

More information

Clearswift SECURE Web Gateway Evaluation Guide

Clearswift SECURE Web Gateway Evaluation Guide Clearswift SECURE Web Gateway Evaluation Guide Revision 1.1 Introduction Thank you for taking the time to evaluate the Clearswift SECURE Web Gateway. Balancing the requirement for strong network security

More information

Has the enforcer become the enabler?

Has the enforcer become the enabler? Has the enforcer become the enabler? What the next evolution of Data Loss Prevention technology means for business collaboration and productivity Dr. Guy Bunker Contents Into the eye of a perfect information

More information

Business Opportunity Enablement through Information Security Compliance

Business Opportunity Enablement through Information Security Compliance Level 3, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 Business Opportunity Enablement through Information Security Compliance Page No.1 Business Opportunity Enablement

More information

Essential Steps to Web Security. A Clearswift Best-Practice Guide

Essential Steps to Web Security. A Clearswift Best-Practice Guide Essential Steps to Web Security A Clearswift Best-Practice Guide Introduction Web 2.0 brings Threat 2.0. The web is changing fast from a one-way medium for brochure-ware to a highly interactive, sophisticated

More information

Critical Information Protection & Security Questions for the Board to ask. January 2016

Critical Information Protection & Security Questions for the Board to ask. January 2016 Critical Information Protection & Security Questions for the Board to ask January 2016 Introduction Board Directors have a number of roles and responsibilities. Asking the right questions of those managing

More information

Data Quality Insight. Graham Rhind. Sponsored by Capscan Ltd

Data Quality Insight. Graham Rhind. Sponsored by Capscan Ltd Graham Rhind Sponsored by Capscan Ltd Table of Contents Page Executive Summary 2 Introduction 4 Key Findings 5 Responsibility 5 Importance 6 Action 7 Stagnation 8 Introspection 14 Conclusion 17 1 Executive

More information

Corporate Security in 2016.

Corporate Security in 2016. Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried

More information

CYBER STREETWISE. Open for Business

CYBER STREETWISE. Open for Business CYBER STREETWISE Open for Business As digital technologies transform the way we live and work, they also change the way that business is being done. There are massive opportunities for businesses that

More information

DIGITAL AMNESIA AT WORK. the risks and rewards of forgetting in business

DIGITAL AMNESIA AT WORK. the risks and rewards of forgetting in business DIGITAL AMNESIA AT WORK the risks and rewards of forgetting in business 12 9 3 6 43 Executive summary Digital Amnesia is the experience of forgetting information that has been entrusted to a digital device.

More information

Encryption Buyers Guide

Encryption Buyers Guide Encryption Buyers Guide Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from

More information

DIGITAL STRATEGY 2014-2017

DIGITAL STRATEGY 2014-2017 DIGITAL STRATEGY 2014-2017 Digital Strategy CONTENTS Introduction 1 Our Vision 3 Benefits 5 Our Digital Design Principles 6 Our Strategy 8 Our Key Enablers 11 INTRODUCTION SFRS uses digital technology

More information

White Paper. The Importance of Securing Emails as Critical Best Practice within Financial Services. Executive Summary

White Paper. The Importance of Securing Emails as Critical Best Practice within Financial Services. Executive Summary White Paper The Importance of Securing Emails as Critical Best Practice within Financial Services IN THIS WHITE PAPER 1. Latest survey results Attitudes toward data security within Financial Services conducted

More information

Addressing the challenges of Performance Management. part of our We think series

Addressing the challenges of Performance Management. part of our We think series Addressing the challenges of Performance Management part of our We think series Contents Contents 2 The Return on Investment in Performance Management 3 The challenges of effective Performance Management

More information

The Impact of Anonymous Proxies In Education

The Impact of Anonymous Proxies In Education The Impact of Anonymous Proxies In Education 2014 Survey Results Proxies can be used to access pornographic or file sharing sites. during Once a student successfully finds a proxy site, everyone knows

More information

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers The Business Impact of the Cloud According to 460 Senior Financial Decision-Makers March 2012 Contents Summary of key findings 4 Finance decision-makers have a high awareness of cloud computing 4 The majority

More information

Staff Use of Social Media Policy

Staff Use of Social Media Policy Staff Use of Social Media Policy Printed copies must not be considered the definitive version DOCUMENT POLICY NO. 11 CONTROL Policy Group Information Governance and Security Author John Version No. 3.0

More information

Simplifying the Challenges of Mobile Device Security

Simplifying the Challenges of Mobile Device Security WHITE PAPER Three Steps to Reduce Mobile Device Security Risks Table of Contents Executive Overview 3 Mobile Device Security: 3 Just as Critical as Security for Desktops, Servers, and Networks 3 Find the

More information

The Online Safety Landscape of Wales

The Online Safety Landscape of Wales The Online Safety Landscape of Wales Prof Andy Phippen Plymouth University image May 2014 SWGfL 2014 1 Executive Summary This report presents top-level findings from data analysis carried out in April

More information

How To Be A Successful Employee

How To Be A Successful Employee Talent Trends 2014 What s on the minds of the professional workforce Introduction For career-minded people everywhere, these are interesting times. Economies continue to falter in several regions of the

More information

A report by Leigh Day into the experiences of disabled people in the workplace

A report by Leigh Day into the experiences of disabled people in the workplace A report by Leigh Day into the experiences of disabled people in the workplace There are over 6.9 million disabled people of working age in Great Britain, nearly a fifth of the total working-age population.

More information

The Shape of Email. Research Report. June 2012. www.mimecast.com

The Shape of Email. Research Report. June 2012. www.mimecast.com The Shape of Email Research Report June 2012 www.mimecast.com Introduction Many companies today are concerned with how information is exchanged both between their organization and others and also within

More information

BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works.

BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

BEAT THE ELITE HOW TO USE CRM TO OUT COMPETE YOUR RIVALS.

BEAT THE ELITE HOW TO USE CRM TO OUT COMPETE YOUR RIVALS. BEAT THE ELITE HOW TO USE CRM TO OUT COMPETE YOUR RIVALS. 1 CONTENTS INTRODUCTION 2 ACHIEVE TARGETED MARKETING 6 CUSTOMER SERVICE AND SATISFACTION 3 EMPOWER STAFF WITH MOBILE CRM 7 DON T RELY ON SPREAD

More information

NHS Fife. Your Business @ Risk - Information Governance and Security Survey

NHS Fife. Your Business @ Risk - Information Governance and Security Survey NHS Fife Your Business @ Risk - Information Governance and Security Survey Prepared for NHS Fife September 2014 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

WHITE PAPER. PCI Compliance: Are UK Businesses Ready?

WHITE PAPER. PCI Compliance: Are UK Businesses Ready? WHITE PAPER PCI Compliance: Are UK Businesses Ready? Executive Summary The Payment Card Industry Data Security Standard (PCI DSS), one of the most prescriptive data protection standards ever developed,

More information

Social Media Policy & E- Safeguarding Staff & Student Guidance

Social Media Policy & E- Safeguarding Staff & Student Guidance Social Media Policy & E- Safeguarding Staff & Student Guidance Introduction Social Media is a fast growing phenomenon and popular sites include: Facebook, Twitter, LinkedIn, Google+. This communication

More information

SERVICE OVERVIEW SERVICES CATALOGUE

SERVICE OVERVIEW SERVICES CATALOGUE SERVICE OVERVIEW SERVICES CATALOGUE February 2010 With a proven track record of 600 modernization projects to date, harness Micro Focus outstanding record and experience of delivering enterprise application

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

The 2015 Cloud Readiness Survey for Australian Accounting Firms

The 2015 Cloud Readiness Survey for Australian Accounting Firms The 2015 Cloud Readiness Survey for Australian Accounting Firms HOW FAR HAVE ACCOUNTANTS TRAVELLED TOWARDS CLOUD ACCOUNTING? A DIGITAL FIRST REPORT FOR SAGE AUSTRALIA Contents Cloud Readiness Survey 1

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE TEN GOOD PRACTICES FOR EMPLOYERS AND THEIR DATA Managing Risk Maximising Opportunity www.controlrisks.com TEN GOOD PRACTICES FOR EMPLOYERS AND THEIR DATA The concept of employees

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Your Company Data, Their Personal Device What Could Go Wrong?

Your Company Data, Their Personal Device What Could Go Wrong? Your Company Data, Their Personal Device What Could Go Wrong? Top 5 Myths about Mobile Security By Barbara Hudson, Senior Product Marketing Manager Employee use of smartphones and tablets to access corporate

More information

THE NEW FORMULA FOR CONNECTING WITH B2B BUYERS

THE NEW FORMULA FOR CONNECTING WITH B2B BUYERS THE NEW FORMULA FOR CONNECTING WITH B2B BUYERS How to use social selling to successfully convert prospects into customers INTRODUCTION B2B Buyers Today: Well Connected, More Demanding, Better Informed

More information

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware

More information

experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation

experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation experts in your field Get the profile: A Progressive Recruitment career guide Contents Introduction... 2 Why you need an online reputation... 3 Monitoring your online reputation... 3 How to protect your

More information

Web Application Vulnerability Scanner: Skipfish

Web Application Vulnerability Scanner: Skipfish Web Application Vulnerability Scanner: Skipfish Page 1 of 7 EXECUTIVE SUMMARY Skipfish is an automated web application vulnerability scanner available for free download at Google s code website. It is

More information

An Acquirer s view: Payment security best practice and PCI DSS compliance. PCI London 23 January 2014

An Acquirer s view: Payment security best practice and PCI DSS compliance. PCI London 23 January 2014 An Acquirer s view: Payment security best practice and PCI DSS compliance PCI London 23 January 2014 Looking back over the years that the Barclaycard Payment Security team has presented at the PCI London

More information

The Public Sector Guide to Social Media Strategy and Policy

The Public Sector Guide to Social Media Strategy and Policy The Public Sector Guide to Social Media Strategy and Policy Use social media with confidence. This guide contains practical steps that will help public sector agencies, organizations and departments develop

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Cisco SAFE: A Security Reference Architecture

Cisco SAFE: A Security Reference Architecture Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed

More information

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY RISKS AND REWARDS OF CONNECTED DEVICES THE HIDDEN INTERNET OF THINGS ISACA 2015 IT RISK / REWARD BAROMETER The Internet of Things paints a vision of a carefree, seamlessly connected world where interconnected

More information

BYLAW 26. Skate Australia Social Media Usage Policy

BYLAW 26. Skate Australia Social Media Usage Policy BYLAW 26 Skate Australia Social Media Usage Policy Adopted August 12, 2012 1.0 Definitions For the purposes of this policy the following definitions apply: Skate Australia (or SA) broadly includes all

More information

Introduction to Dementia Care Mapping (DCM )

Introduction to Dementia Care Mapping (DCM ) Introduction to Dementia Care Mapping (DCM ) Dementia Care Mapping is an established approach to achieving and embedding person-centred care for people with dementia. For over 20 years it has been used

More information

Your Complete CRM Handbook

Your Complete CRM Handbook Your Complete CRM Handbook Introduction Introduction Chapter 1: Signs You REALLY Need a CRM Chapter 2: How CRM Improves Productivity Chapter 3: How to Craft a CRM Strategy Chapter 4: Maximizing Your CRM

More information

Moving your business to the Cloud Fact or Fiction?

Moving your business to the Cloud Fact or Fiction? Moving your business to the Cloud Fact or Fiction? Introduction The cloud, perhaps one the most commonly used business terms, has changed the way we work and using cloud applications has many benefits

More information

An Employee Centric Approach To HR Employee Experience Journey Mapping (EXJM)

An Employee Centric Approach To HR Employee Experience Journey Mapping (EXJM) An Employee Centric Approach To HR Employee Experience Journey Mapping (EXJM) Table of ConTenTs 03 Executive Summary 04 We re all on a journey... 04 More of the same from HR isn t going to cut it 07 Does

More information

An Introduction to Continuous Controls Monitoring

An Introduction to Continuous Controls Monitoring An Introduction to Continuous Controls Monitoring Reduce compliance costs, strengthen the control environment and lessen the risk of unintentional errors and fraud Richard Hunt, Managing Director Marc

More information

5 costly mistakes you should avoid when developing new products

5 costly mistakes you should avoid when developing new products 5 costly mistakes you should avoid when developing new products By Paul Forsythe Managing Director at Alemare Solutions And Product Development expert with 25 years experience Hello, As you will know,

More information

From the experts: Managing mobility for the enterprise

From the experts: Managing mobility for the enterprise From the experts: Managing mobility for the enterprise Key insights around Enterprise Mobility Management Vodafone Power to you The human factor Your people are out there using their own devices already.

More information

Macmillan Cancer Support Volunteering Policy

Macmillan Cancer Support Volunteering Policy Macmillan Cancer Support Volunteering Policy Introduction Thousands of volunteers dedicate time and energy to improve the lives of people affected by cancer. Macmillan was started by a volunteer and volunteers

More information

The Career Paradox for UK Women. An in-depth study across industry sectors exploring career support, the working environment and the talent pipeline.

The Career Paradox for UK Women. An in-depth study across industry sectors exploring career support, the working environment and the talent pipeline. The Career Paradox for UK Women An in-depth study across industry sectors exploring career support, the working environment and the talent pipeline. Executive Summary This report is an examination of the

More information

Today s Talent Flight Risk:

Today s Talent Flight Risk: RESEARCH STUDY Today s Talent Flight Risk: Why Your Employees Are Taking Off and What HR Can Do About It Employee Development Survey September 2015 Imagine walking into your workplace and seeing one out

More information

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was

More information

Data Centre Services. Secure management of business critical data and systems

Data Centre Services. Secure management of business critical data and systems Data Centre Services Secure management of business critical data and systems DATA CE Many businesses house their valuable and sensitive IT infrastructure within expensive and inadequate floor space where

More information

Consumer Awareness Guide. Using Recruitment Agencies

Consumer Awareness Guide. Using Recruitment Agencies Consumer Awareness Guide Using Recruitment Agencies Prepared By Ian M Campbell Avenue Scotland Introduction At Avenue Scotland, we take great pride in the honest, professional service we provide. We have

More information

INFORMATION SECURITY AWARENESS TRAINING. A New Approach.

INFORMATION SECURITY AWARENESS TRAINING. A New Approach. INFORMATION SECURITY AWARENESS TRAINING A New Approach. 2 Information Security Awareness Training - A New Approach Introduction From Jason Baker, Head of Instructional Design EMEA, SAI Global Compliance

More information

Frequently Asked Questions

Frequently Asked Questions Clearswift SECURE ICAP Gateway v4.2 Version 01 30/07/2015 Clearswift Public Copyright Version 1.0, July, 2015 Published by Clearswift Ltd. 1995 2015 Clearswift Ltd. All rights reserved. The materials contained

More information

The principles of PRINCE2

The principles of PRINCE2 The principles of PRINCE2 The project management framework known as PRINCE2 is based upon a set of principles. These principles are the bedrock and foundations upon which everything else in the framework

More information

Information Governance in Dental Practices. Summary of findings from ICO reviews. September 2015

Information Governance in Dental Practices. Summary of findings from ICO reviews. September 2015 Information Governance in Dental Practices Summary of findings from ICO reviews September 2015 Executive summary The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that

More information

Protecting Your Roaming Workforce With Cloud-Based Security

Protecting Your Roaming Workforce With Cloud-Based Security Protecting Your Roaming Workforce With Cloud-Based Security How to use the cloud to secure endpoints beyond your perimeter By Tsailing Merrem, Senior Product Marketing Manager Remote and roaming workers

More information

KEY GUIDE. The key stages of financial planning

KEY GUIDE. The key stages of financial planning KEY GUIDE The key stages of financial planning Financial planning has witnessed significant change, so it is not surprising that most people are unclear about what financial planners actually do. The aim

More information

A SHORT GUIDE TO THE IRISH FOOTBALL ASSOCIATION BETTING RULES. Your reputation! Your responsibility! Your career!

A SHORT GUIDE TO THE IRISH FOOTBALL ASSOCIATION BETTING RULES. Your reputation! Your responsibility! Your career! A SHORT GUIDE TO THE IRISH FOOTBALL ASSOCIATION BETTING RULES Your reputation! Your responsibility! Your career! why are there rules relating to betting? Introduction UEFA and the Irish Football Association

More information

Beginners Guide to Sports Arbitrage Trading and Bonus Scalping

Beginners Guide to Sports Arbitrage Trading and Bonus Scalping Beginners Guide to Sports Arbitrage Trading and Bonus Scalping Contents What Is Sports Arbitrage Trading? What Is Bonus Scalping? Risks of Sports Arbitrage Trading? Betfair/Betdaq The Spreadsheet Worked

More information

Preparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world

Preparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world Contents 3 6 11 16 19 Introduction Preparing for a crisis During a crisis After the crisis About The Partners Group 2 In the new world of social media and mobile technology, communication is instantaneous,

More information

Web Success For Your Business

Web Success For Your Business Graham Jones Internet Psychologist Web Success For Your Business How a completely new online strategy will boost your business Contents Introduction...3 Assessing the opportunity...4 It s different online...5

More information

Returning to work after brain injury

Returning to work after brain injury Returning to work after brain injury Introduction There are many ways to approach returning to work after a brain injury and this factsheet provides some strategies that have been shown to enhance the

More information

Getting Ahead of the Mobile Revolution

Getting Ahead of the Mobile Revolution Getting Ahead of the Mobile Revolution Leverage the Power of Your Growing Mobile Workforce Today s businesses face a technological sea change as employees continue to make BYOD (bring your own device)

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Enterprise Social Networks - The Seven Advantages

Enterprise Social Networks - The Seven Advantages BEST PRACTICE IN ENTREPRISE SOCIAL NETWORKING - 2013 BY WITH 0 ZYNCRO 2013. All right reserved CONTENU - 1/ GUIDELINES FOR USING ENTERPRISE SOCIAL NETWORKS - P.02 2/ HOW AND WHEN TO USE ENTERPRISE SOCIAL

More information

Social Media For Law Firms

Social Media For Law Firms Social Media For Law Firms Considerations and Recommendations (Based on the SRA Handbook and the Law Society practice notes) January 2013 Introduction Social Media in the Legal Industry The last year (2012)

More information

Managing Growth, Risk and the Cloud

Managing Growth, Risk and the Cloud Managing Growth, Risk and the Cloud Executive Summary of Independent Market Research Commissioned by Zenium Data Centers Spring 2015 Foreword Rising data volumes combined with the always on approach to

More information

Cloud Storage and Sharing Platforms - The Fear of risk

Cloud Storage and Sharing Platforms - The Fear of risk 2014 Danger in the Cloud Report Tresorit research report: examining the attitudes on the safety and security of professional and private information online in the U.S. September 2014 Foreword by Istvan

More information

Email Etiquette (Netiquette) Guidance

Email Etiquette (Netiquette) Guidance Email Etiquette (Netiquette) Guidance January 2007 Email Etiquette (Netiquette) Guidance January 2007-1/13 Version Control Version Author(s) Replacement Date 1.0 Timothy d Estrubé Information Governance

More information

Online leadership academy at Telefonica O2 How learning design and technology can provide a complete learning journey

Online leadership academy at Telefonica O2 How learning design and technology can provide a complete learning journey Online leadership academy at Telefonica O2 How learning design and technology can provide a complete learning journey O ne of the biggest L&D investments organisations make is in their leadership development

More information

Evolving your network for the BYOD Era

Evolving your network for the BYOD Era Viewpoint Evolving your network for the BYOD Era 3-step guide to developing a mobility strategy Survive the rising tide of mobile devices in your workplace 1 Contents uide for CIOs Introduction: The Rise

More information

Project Management made easy

Project Management made easy Project Management made easy www.wetrack.com @Wetracksoftware Contents Introduction pg 3 Customisation & Reports pg 5 Objectives, Risks and Activities pg 7 Incident Management Module pg 9 Run Sheet Module

More information

Mobile Users and Privacy Issues

Mobile Users and Privacy Issues MOBILE PRIVACY: Consumer research insights and considerations for policymakers February 2014 Mobile and Privacy 1 2 MOBILE INTERNET: MAXIMISING GLOBAL OPPORTUNITIES AND ADDRESSING PRIVACY CHALLENGES The

More information

Winning Legal Business from Medium-Sized Companies. Silvia hodges phd

Winning Legal Business from Medium-Sized Companies. Silvia hodges phd Winning Legal Business from Medium-Sized Companies Silvia hodges phd Published by In association with Winning Legal Business from Medium-Sized Companies is published by Ark Group UK/EUROPE OFFICE Ark Conferences

More information

Balancing your content distribution strategy across paid, earned and owned channels. Insight. a guide for the B2B technology marketer

Balancing your content distribution strategy across paid, earned and owned channels. Insight. a guide for the B2B technology marketer Insight Balancing your content distribution strategy across paid, earned and owned channels a guide for the B2B technology marketer 1 Tel: +44 (0) 2074 286017 www.pulsecomms.com C ontent marketing has

More information

Career Development Research Summary. Exploring the career development landscape in 2014, after one of the deepest recessions in recent history

Career Development Research Summary. Exploring the career development landscape in 2014, after one of the deepest recessions in recent history Career Development Research Summary Exploring the career development landscape in 2014, after one of the deepest recessions in recent history Introduction Every company wants engaged, motivated, proactive

More information

ROBERT WALTERS WHITEPAPER USING SOCIAL MEDIA IN THE RECRUITMENT PROCESS

ROBERT WALTERS WHITEPAPER USING SOCIAL MEDIA IN THE RECRUITMENT PROCESS ROBERT WALTERS WHITEPAPER USING SOCIAL MEDIA IN THE RECRUITMENT PROCESS INTRODUCTION The social media phenomenon has opened up new paths of engagement and revolutionised the exchange of information. With

More information

Social Media- tips for use and development Useful tips & things to avoid when using social media to promote a Charity.

Social Media- tips for use and development Useful tips & things to avoid when using social media to promote a Charity. Social Media- tips for use and development Useful tips & things to avoid when using social media to promote a Charity. This is compilation of some of the advice and guidance found online to help organisations

More information

The Importance of Professional Email Services for Small Business

The Importance of Professional Email Services for Small Business The Role of Professional Email Services for Small to Medium Enterprises (SMEs) May 2013 The Role of Professional Email Services for Small to Medium Enterprises. Executive Summary The means by which small

More information

Employees tell the truth about your company s data. How to make mobile devices safe for work and play

Employees tell the truth about your company s data. How to make mobile devices safe for work and play Employees tell the truth about your company s data How to make mobile devices safe for work and play Table of contents Executive summary... p3 Introduction the habit of a lifetime... p3 The survey results

More information

Health and safety management. Cardinus Risk Management explain why safety comes first with JobWatch powered by BigChange

Health and safety management. Cardinus Risk Management explain why safety comes first with JobWatch powered by BigChange Health and safety management Cardinus Risk Management explain why safety comes first with JobWatch powered by BigChange Contents 3 Introduction 4 How it works 5 Benefits 6 Improving behaviour and communication

More information

In good health. Public health teams in local authorities Year 2. February 2015

In good health. Public health teams in local authorities Year 2. February 2015 In good health Public health teams in local authorities Year 2 February 2015 Foreword The public health workforce is at the heart of both improving and protecting the public s health and as such the views

More information

Prepared by. August 2009. 2009 RUSSELL HERDER and ETHOS BUSINESS LAW

Prepared by. August 2009. 2009 RUSSELL HERDER and ETHOS BUSINESS LAW embracing the opportunities, averting the risks. Prepared by August 2009 INTRODUCTION There is little question that social media is high on the agenda of corporate and nonprofit decision-makers across

More information

Understanding and articulating risk appetite

Understanding and articulating risk appetite Understanding and articulating risk appetite advisory Understanding and articulating risk appetite Understanding and articulating risk appetite When risk appetite is properly understood and clearly defined,

More information

Perception and knowledge of IT threats: the consumer s point of view

Perception and knowledge of IT threats: the consumer s point of view Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of

More information

8 Tips for creating a savvy Social Media Policy

8 Tips for creating a savvy Social Media Policy 8 Tips for creating a savvy Social Media Policy Introduction In today s modern world, the number of people using social media continues to rise on a daily basis. Whether or not you re using social channels

More information

ARgon: The Foundation of an Adaptive Data Loss Prevention Strategy

ARgon: The Foundation of an Adaptive Data Loss Prevention Strategy ARgon: The Foundation of an Adaptive Data Loss Prevention Strategy Dr. Guy Bunker White paper ARgon: Adaptive Data Loss Prevention Strategy V1.0, April 2015 www.clearswift.com 2 ARgon: Adaptive Data Loss

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

FEELING VULNERABLE? YOU SHOULD BE.

FEELING VULNERABLE? YOU SHOULD BE. VULNERABILITY ASSESSMENT FEELING VULNERABLE? YOU SHOULD BE. CONTENTS Feeling Vulnerable? You should be 3-4 Summary of Research 5 Did you remember to lock the door? 6 Filling the information vacuum 7 Quantifying

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information