Employee Stress Puts Data in Danger

The Harvard Business Review conducted a survey of more than 330 remote employees from a wide range of industries to self-report on both their daily stress levels and their adherence to cybersecurity policies over the duration of two weeks.
During the 10 workdays HBR studied, 67% of the participants reported failing to fully adhere to cybersecurity policies at least once, with an average failure-to-comply rate of once out of every 20 job tasks.
These three responses accounted for 85% of the cases in which employees knowingly broke the rules.
In contrast, employees reported a malicious desire to cause harm in only 3% of policy breaches - making non-malicious breaches 28 times more common than retaliatory ones.
Against this backdrop, the imperative for organizations to fortify their cybersecurity measures becomes even more pronounced.
In the modern cybersecurity landscape, where every employee potentially serves as a threat vector, the need for technical and business leaders to comprehend the underlying factors contributing to non-compliance is paramount.
The Harvard Business Review's analysis underscores a paradigm shift in cybersecurity philosophy, suggesting that security policies should not solely concentrate on repelling malicious attacks.
In the modern cybersecurity landscape, every employee is a potential threat vector.
In order to safeguard their organizations effectively from employee stress, leaders in both technical and business domains must possess a comprehensive understanding of the factors that can render individuals vulnerable to disregarding policies, thus inadvertently creating openings for potential attackers.
While it can't eliminate stress, Apono can make sure that stressed employees don't have standing access to important resources.
Instead, employees must request time-bound access to what they need.
Apono delivers cutting-edge least-privilege access management solutions, offering a suite of sophisticated tools that elevate access control through dynamic mechanisms.
At the heart of Apono's comprehensive platform lies a commitment to revolutionizing access management practices, empowering organizations to navigate the intricate landscape of cybersecurity with unparalleled efficiency and precision.
Central to Apono's arsenal of capabilities is the integration of Just-In-Time access, a transformative feature that enables organizations to transcend traditional access models.
This dynamic mechanism ensures that employees only acquire access privileges precisely when needed, mitigating the risks associated with prolonged or unnecessary access rights.
By embracing JIT access, organizations can bolster their security posture by minimizing the window of vulnerability, strategically aligning access privileges with the ebb and flow of operational demands.
Complementing JIT access is Apono's robust implementation of Attribute-Based Access Control, further fortifying its position as a trailblazer in access management solutions.
ABAC introduces a layer of granularity and sophistication by factoring in various attributes, such as user roles, attributes, and environmental variables, in determining access rights.
This nuanced approach allows organizations to craft a more fine-tuned and adaptable access management strategy that responds dynamically to contextual factors, fostering a security framework that is not only robust but also inherently flexible.
This is a Security Bloggers Network syndicated blog from Apono authored by Rom Carmel.


This Cyber News was published on securityboulevard.com. Publication date: Sun, 03 Dec 2023 18:13:08 +0000


Cyber News related to Employee Stress Puts Data in Danger

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 month ago Aws.amazon.com
3 ways to reduce stress on the DevSecOps team - My session focused on the stresses and burnout experienced by security teams, including recent data showing that 94% of chief information security officers suffer from work-related stress, and 65% admit their stress levels compromise their ability to ...
11 months ago Infoworld.com
Employee Stress Puts Data in Danger - The Harvard Business Review conducted a survey of more than 330 remote employees from a wide range of industries to self-report on both their daily stress levels and their adherence to cybersecurity policies over the duration of two weeks. During the ...
11 months ago Securityboulevard.com
Cofense enhances PhishMe to identify engagement and resilience gaps across all employee levels - Cofense unveiled new enhancements to its PhishMe Employee Security Awareness Training Platform. Employee Engagement Index, is set to transform how organizations manage email security risks. The introduction of the Employee Engagement Index transforms ...
4 months ago Helpnetsecurity.com
CVE-2024-50223 - In the Linux kernel, the following vulnerability has been resolved: sched/numa: Fix the potential null pointer dereference in task_numa_work() When running stress-ng-vm-segv test, we found a null pointer dereference error in task_numa_work(). Here is ...
1 week ago Tenable.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
8 months ago Feeds.dzone.com
Employee giving and volunteerism drives positive business outcomes - Cisco was honored last year to win the top spot on People's 2023 List of Companies That Care, and a key factor was our employee culture of giving back. We've been on a multi-year journey to engage our employees for positive impact at scale. Not only ...
10 months ago Feedpress.me
The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox - Despite the technological advancements brought by automation and the enhanced capabilities of data analytics that have transformed decision-making processes, the digital age has proved to be a double-edged sword with an unsettling rise in employee ...
8 months ago Cyberdefensemagazine.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
8 months ago Venturebeat.com
CVE-2023-52836 - In the Linux kernel, the following vulnerability has been resolved: locking/ww_mutex/test: Fix potential workqueue corruption In some cases running with the test-ww_mutex code, I was seeing odd behavior where sometimes it seemed flush_workqueue was ...
5 months ago Tenable.com
Cyber security professionals are exhausted, and it's putting firms at greater risk of attack - An epidemic of stress among cyber security professionals is putting organizations at a greater risk of cyber attack, according to a new report. A survey of 500 UK cyber security professionals by security firm Adarma found that just over half of ...
11 months ago Itpro.com
Cisco Allowed Me To Start My Family, Stress-Free - For others, the road is bumpier and has many pit stops along the way. One in six couples struggles with fertility. After a year and a half of trying to conceive, I found myself facing the real possibility of IVF being the most likely path to ...
10 months ago Feedpress.me
Data Privacy and Cloud Computing - In the digital era, where data has become the backbone of businesses, it becomes very important to ensure its security and privacy. The huge growth in cloud computing, wherein data is stored and processed remotely, gave rise to various measures for ...
11 months ago Feeds.dzone.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
11 months ago Helpnetsecurity.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
8 months ago Feeds.dzone.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
1 year ago Tripwire.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
10 months ago Securityboulevard.com
Human-Centric Security Model Meets People Where They Are - According to Gartner's Drivers of Secure Behavior survey, 93% of employees who behave insecurely do so knowingly. The Many Paths to Human-Centric Security Human-centric security considers people's behaviors, needs, and limitations at all points - not ...
11 months ago Darkreading.com
Business Data Privacy Laws: Compliance and Beyond - Governments worldwide have implemented strict data privacy laws to protect individuals' information in the face of increasing cyber threats and data breaches. Let's dive into the world of business data privacy laws as we navigate the complexities of ...
9 months ago Securityzap.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
10 months ago Securityzap.com
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
11 months ago Microsoft.com
Developing Software Applications Under the Guidance of Data-Driven Decision-Making Principles - To architect and cultivate an application that yields precise outputs in alignment with business requirements, paramount emphasis must be given to the foundational data and the pertinent data scenarios shaping the application. Software application ...
9 months ago Feeds.dzone.com
Acer confirms Philippines employee data leaked on hacking forum - Acer Philippines confirmed that employee data was stolen in an attack on a third-party vendor who manages the company's employee attendance data after a threat actor leaked the data on a hacking forum. Acer is a Taiwanese maker of computer hardware ...
8 months ago Bleepingcomputer.com
Data Privacy and Security - Organizations are gradually becoming concerned regarding data security in several instances, such as collecting and retaining sensitive information and processing personal information in external environments, which include information sharing and ...
11 months ago Feeds.dzone.com
How To Implement Data Management Into Your AI Strategy - While an AI strategy has different components, including infrastructure, technology stack, organizational changes, and more, the most important is the data strategy. A well-defined data strategy is the foundation for successful AI implementation. AI ...
11 months ago Feeds.dzone.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)