Employees 'care more about securing personal data than work data'

Password protection commonplace in the home, but not in the office, finds Citrix

UK workers take greater steps to protect personal files than work documents, a new study has revealed.

The survey of 2,000 full-time UK workers around the country carried out by Censuswide last year on behalf of Citrix, found what the virtualisation and cloud services firm described as "an alarming disparity in employee attitudes toward work and personal data".

Of those surveyed, 45 per cent said they regularly use passwords to secure documents at home, but only 35 per cent said they did so at work.

This contrast is even more stark when it comes to the destruction of physical documents. While nearly 70 per cent of respondents said they shred and dispose of unwanted personal documents, only 40 per cent do the same at work.

The survey also asked about people's attitudes towards device security. While almost 60 per cent of over 55s said they would only use work devices with trusted company security software, only 47 per cent of workers aged 25-34 could say the same.

This comparatively laid-back attitude could present a significant security risk for businesses if an unsecured device with access to the company network or data were compromised, Citrix claimed.

Chris Mayers, chief security architect at the company, said: "This research demonstrates that despite many individuals being well aware of basic precautions for handling their own personal data, too many are not so conscientious at work.

"Employers have a responsibility to provide the tools and safeguards: employees need to use them. Protecting a company's digital assets is a two-way street."

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Data breach exposes widespread fake reviews on Amazon
data breaches

Data breach exposes widespread fake reviews on Amazon

7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
Qualcomm modem flaw puts millions of Android users at risk
Google Android

Qualcomm modem flaw puts millions of Android users at risk

6 May 2021