Employees 'care more about securing personal data than work data'

Password protection commonplace in the home, but not in the office, finds Citrix

UK workers take greater steps to protect personal files than work documents, a new study has revealed.

The survey of 2,000 full-time UK workers around the country carried out by Censuswide last year on behalf of Citrix, found what the virtualisation and cloud services firm described as "an alarming disparity in employee attitudes toward work and personal data".

Advertisement - Article continues below

Of those surveyed, 45 per cent said they regularly use passwords to secure documents at home, but only 35 per cent said they did so at work.

This contrast is even more stark when it comes to the destruction of physical documents. While nearly 70 per cent of respondents said they shred and dispose of unwanted personal documents, only 40 per cent do the same at work.

The survey also asked about people's attitudes towards device security. While almost 60 per cent of over 55s said they would only use work devices with trusted company security software, only 47 per cent of workers aged 25-34 could say the same.

This comparatively laid-back attitude could present a significant security risk for businesses if an unsecured device with access to the company network or data were compromised, Citrix claimed.

Chris Mayers, chief security architect at the company, said: "This research demonstrates that despite many individuals being well aware of basic precautions for handling their own personal data, too many are not so conscientious at work.

Advertisement
Advertisement - Article continues below

"Employers have a responsibility to provide the tools and safeguards: employees need to use them. Protecting a company's digital assets is a two-way street."

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/saas/28932/everything-you-need-to-know-about-citrix
software as a service (SaaS)

Everything you need to know about Citrix

11 Feb 2020
Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/business/policy-legislation/356256/uk-invested-about-ps500m-in-wrong-gps-satellites
Policy & legislation

UK gov buys "wrong" satellites in £500m blunder

29 Jun 2020
Visit/security/34616/the-top-password-cracking-techniques-used-by-hackers
Security

The top 12 password-cracking techniques used by hackers

12 Jun 2020