The Worst Security Offenders? IT Pros

Karen A. Frenkel Avatar

Updated on:

The Worst Security Offenders? IT Pros

The Worst Security Offenders? IT ProsThe Worst Security Offenders? IT Pros

Seriously, techies? IT professionals’ security habits pose the greatest risk at work, according to a recent survey.

IT Professionals Compared to OthersIT Professionals Compared to Others

65% of IT professionals share Web logins with many users, compared to 46% of employees across all functions.

Personal Password UsePersonal Password Use

52% of IT professionals use their personal passwords for business apps compared to 40% of other employees.

Sharing Logins and PasswordsSharing Logins and Passwords

32% of IT professionals have given their login/password to another employee, compared to 19% of other employees.

Installing Apps Without Consulting ITInstalling Apps Without Consulting IT

Asked whether it’s OK to install applications on their computer without consulting the IT department, 59% of IT professionals said yes, compared to 73% of all respondents.

Attitudes Towards Confidential InformationAttitudes Towards Confidential Information

56% of IT professionals said they would copy confidential company information when leaving their current job—about twice the rate of general business professionals.

Accessing Systems After Leaving a JobAccessing Systems After Leaving a Job

28% of IT pros said they have accessed systems belonging to previous employers after they left their job, compared to 13% of all respondents.

Millennials Install Apps Without PermissionMillennials Install Apps Without Permission

41% of Millennials think it’s fine to install applications on their work computer without consulting the IT department.

Millennials and Personal Passwords for BusinessMillennials and Personal Passwords for Business

50% of Millennials use personal passwords for business applications, compared to 38% for Gen Xers and 32% of Baby Boomers.

Tenured EmployeesTenured Employees

If tenured employees leave their current job, they are nine times more likely to access their company’s information after they leave.

Karen A. Frenkel Avatar