This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Young workers ignore IT policy and 'aren't responsible' for protecting data and kit

Share this article:

IT policy is ignored by seven out of ten young employees, while many of them believe it needs to be modified to address their demands for flexible working.

According to the third chapter of the Cisco Connected World report and the its Annual Security Report – which surveys more than 2,800 college students and young professionals in 14 countries – 33 per cent of the sample believe they are not doing anything wrong in ignoring official IT policy.

One in five (22 per cent) cited the need to access unauthorised programs and applications to get their job done, while 19 per cent admitted the policies are not enforced. Some (18 per cent) said they do not have time to think about policies when they are working, and others either said adhering to the policies is not convenient (16 per cent), they forget to do so (15 per cent) or they are not supervised (14 per cent).

Also, 61 per cent believed they are not responsible for protecting information and devices, saying that IT and/or service providers are accountable.

Rebecca Jacoby, CIO at Cisco, said: “The role of IT in any business is to successfully bring together technology architectures and business architectures. As workforces become increasingly mobile, the shift in IT infrastructure means that security and policy are no longer an ‘add-on', but the highest priority.

“These findings indicate a real need for a thoughtful and strategic approach for the types of IT services offered while taking into consideration the established processes and culture of any organisation to create stronger, trusted relationships between employees and IT departments.”

John N. Stewart, chief security officer at Cisco, said: “The findings provide valuable insights into how we must adapt IT and security policies to enable mobility and productivity while still managing risk. Done well, security enables mobility and social media access to provide the necessary productivity boost.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Google and Facebook offer free cyber-security tools

Google and Facebook offer free cyber-security tools

Google and Facebook have both launched free open-source cyber-security tools this week, designed to help security professionals spot malware and cyber-attacks.

Mixed results for key Government cyber-initiatives

Mixed results for key Government cyber-initiatives

The Government's Verify scheme to confirm IDs is behind scheuduled uptake, but its CISP threat intelligence sharing scheme is ahead of target.

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...