Preview

Brainia Essay FirstDraft

Good Essays
Open Document
Open Document
601 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Brainia Essay FirstDraft
The Underlying Problem with Internet Abuse in the Workplace
Shockingly, in today’s modern workplace, employers seemingly turn their heads to e-risk management despite the consequences. Experts claim millions of dollars are lost in productivity, computer assets, credibility and customer confidence. Is someone really watching what employees click? The Internet in the workplace causes security risks because of employee misuse, lack of employer policy and inadequate firewall systems. Interestingly enough, less than half, 40% (Clearswift, 2003) of employers surveyed educate their employees about viruses. Since employees are rarely informed about the risks involved with Internet misuse, the number of e-risk incidences continue to rise. According to Bickford (2006) “many personal computer users feel they must install accessory programs that complicate the normal processes associated with the retrieval of web based information”; thus creating a technical support burden. Furthermore “most employers fail to see attacks as a people problem as well as a technical challenge.” Assurex and Clearswift (2003). With workplace internet use on the rise, many users have found ways to circumvent firewalls leaving employers susceptible to viruses and malware. In an effort to expedite communication in the workplace, many employers rely on e-mail and obtain information from databases containing personal consumer data. Most employers have written policies to regulate external email, as per Clearswift’s (2003) survey, only 48% actually enforce their policies with security software. Those that do enforce their policies also tend to have a double standard when it comes to executives. However, according to Tom Olzak(2010), “It isn’t just senior managers, however, who are targets.” and “When this double-standard exists, it presents a large attack surface to an attacker using a targeted approach.”. Additionally, Clearswift’s survey indicates that 19% of employers have battled lawsuits



References: Business not prepared for e-risks. (2003). Computer Security Update, 5 Bickford, D. (2006). Firewalls, ad-blockers, web accelerators, etc.: helping remote users of electronic resources overcome barriers to access. Journal of Library Administration, 45(3/4), 511-512. doi:10.1300/J111v45n03̱12 Olzak,T. (2010, June 28). What you need to know to survive targeted malware attacks. Tech Republic. Retrieved from http://www.techrepublic.com/blog/it-security/what-you-need-to-know-to-survive-targeted-malware-attacks/

You May Also Find These Documents Helpful

  • Better Essays

    Internet and the Workplace

    • 1937 Words
    • 8 Pages

    However, in addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes, employees are also using the Internet for personal use, whether for sending personal e-mail messages, playing games, downloading pornography, ordering goods online, checking stock prices, or gambling. Accordingly, many issues have come to light involving employee e-mail and Internet use. Employers have to question how much, if any, personal use of the Internet and e-mail to permit in the workplace. Employers are also grappling with the question of whether to monitor Internet use and whether to block access to certain…

    • 1937 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79-98…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Malware Analysis Paper

    • 2168 Words
    • 9 Pages

    The advent of networks and information systems revolutionized the way that individuals and large organizations conduct daily operations. Individuals utilize computers to check electronic mail, surf the internet, pay bills, and even go to school for their degrees. Large organizations do the same things, but in a much larger scale. Additionally, these large organizations utilize information systems to store sensitive data from its clientele and its employees. This information may include social security numbers, credit card information, birth dates, account numbers, and other personal identifiable information. What this amounts to is a gold mine for cyber criminals and motivation for them to breach these information systems to collect that data…

    • 2168 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Virtually every business today uses at least one form of computer information technology. Business firms use computers to automate and assist in managing everything from operations, sales, finance, and logistics. Internal databases and intranets are used for internal controls and organizations are connected via the internet to conduct sales, marketing and many other communications and transactions. Electronic business, or e-business, is dominating modern markets and the business world. This new world of technological innovation has exponentially increased efficiency and globalized the world’s economies. Unfortunately criminals still exist and continue to exploit businesses, committing acts of theft, vandalism, and terror. E-business is not immune to criminal mischief and in fact can be quite vulnerable to sophisticated cyber criminals known as hackers. In early 2008 it was reported that the North East Supermarket mogul, Hannaford Bros. Company fell victim to a computer hacking attack that compromised approximately 4.2 million customer credit cards. This act created a financial nightmare for thousands of consumers and for the Hannaford Bros. grocery company. The incident was a black mark on Hannaford’s public image and a financial burden to their corporation. Cyber Security is a growing priority of today’s business leadership. Boon, Kurtz (2011)…

    • 1647 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    As email is electronic it means that it is very easy for organisations to monitor the use of email. It is even possible to monitor employees’ use of email without their knowledge. An organisation may choose to monitor staff use of email to protect the company’s image and reputation. Employers could argue that they have the right to information about their employees use of a work tool. Employees could argue that monitoring their email is a violation of their right to privacy. Hence, electronic monitoring of employees email use is a very contentious issue that raises ethical dilemmas for an organisation.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Principles of Information Security, Fourth Edition Michael E. Whitman and Herbert J. Mattord Vice President Editorial, Career Education & Training Solutions: Dave Garza Director of Learning Solutions: Matthew Kane Executive Editor: Steve Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Development Editor: Lynne Raughley Editorial Assistant: Jennifer Wheaton Vice President Marketing, Career Education & Training Solutions: Jennifer Ann Baker Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Associate Marketing Manager: Shanna Gibbs Production Manager: Andrew Crouth Content Project Manager: Brooke Greenhouse Senior Art Director: Jack Pendleton Manufacturing Coordinator: Amy Rogers Technical Edit/Quality Assurance: Green Pen Quality Assurance…

    • 18692 Words
    • 75 Pages
    Powerful Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber security has been slowly taking over as the main concern for security professionals as well as organizations. This is due to a larger emphasis on using paperless methods in order to keep track of customer’s data, financial records as well as many other important documents. Without properly trained IT professionals as well as an increase in maintaining up to date security these attacks will continue to have success. Another issue is the lack of legislation regarding cyber crime and their perpetrators.…

    • 649 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Penetration Testing

    • 3406 Words
    • 14 Pages

    As electronic commerce, online business-to-business operations, and global connectivity have become vital components of a successful business strategy, enterprises have adopted security processes and practices to protect information assets. But if you look at today's computing environments, system security is a horrible game of numbers: there are currently over 9,223 publicly released vulnerabilities covering known security holes in a massive range of applications from popular Operating Systems through to obscure and relatively unknown web applications. [01] Over 300 new vulnerabilities are being discovered and released each month. Most companies work diligently to maintain an efficient, effective security policy, implementing the latest products and services to prevent fraud, vandalism, sabotage, and denial of service attacks. But the fact is you have to patch every hole of your system, but an attacker need find only one to get into your environment. Whilst many organisations subscribe to major vendor's security alerts, these are just the tip of the security iceberg and even these are often ignored. For example, the patch for the Code Red worm was available some weeks before the worm was released. [02]…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Cyber Slacking

    • 287 Words
    • 2 Pages

    Whether it is called cyber slacking, computer gold-bricking, cyberloafing, or any of the other dozens of nicknames that have surfaced over the last decade, surfing the web for personal use during work time is a world-wide problem. It is so common these days that many people won’t think twice about surfing the web for personal use, but according to the International Association for Computer Information Systems (2009), cyber slacking costs American businesses $54 billion and 30-40% of productivity losses every year.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Web Surfing

    • 470 Words
    • 2 Pages

    Internet is essential in people’s life, and internet surfing is very popular nowadays. Nevertheless, office workers may be fire due to surfing on the internet in workplace. It is not a valid reason to fire an employee since Internet surfing has three positive influences on office workers.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays