Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Businesses Security IT

Employees Admit They'd Walk Out With Stolen Data If Fired 380

Gunkerty Jeb writes "In a recent survey of IT managers and executives, nearly half of respondents admitted that if they were fired tomorrow they would walk out with proprietary data such as privileged password lists, company databases, R&D plans and financial reports — even though they know they are not entitled to it. So, it's no surprise that 71 percent believe the insider threat is the priority security concern and poses the most significant business risk. Despite growing awareness of the need to better monitor privileged accounts, only 57 percent say they actively do so. The other 43 percent weren't sure or knew they didn't. And of those that monitored, more than half said they could get around the current controls."
This discussion has been archived. No new comments can be posted.

Employees Admit They'd Walk Out With Stolen Data If Fired

Comments Filter:
  • by el_tedward ( 1612093 ) on Wednesday June 13, 2012 @08:33PM (#40317107)

    Everyone preaches about the insider threat, even though less than 4% of all incidents come from insiders.. If you count by the number of breached records, insiders make up less than 1% of all breached records (though, arguably, they may be breaching records that are more valuable)

    http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf [verizonbusiness.com]

  • by LordLucless ( 582312 ) on Wednesday June 13, 2012 @08:57PM (#40317369)

    What the hell is wrong with the rest of you?

    Nothing. We wouldn't either. But our execs and senior management apparently would. Read the summary.

  • by houstonbofh ( 602064 ) on Wednesday June 13, 2012 @09:12PM (#40317509)
    It could never have been cached passwords in the tools at home that tried to connect when they first open the app... Nope. That never happens. When I left, I had to start my soft phone app to delete the account in it. It don't know if it still worked or not...
  • Re:Best Pratices (Score:5, Informative)

    by siddesu ( 698447 ) on Wednesday June 13, 2012 @09:43PM (#40317775)

    This is not a "best practice", as it is completely worthless.

    There is a best practice on the opposite side that is capable to defeat your "best practice" on any day of the week and twice during the weekend, and all smart employees have figured it out long ago. It is for the employee to collect the data while they have access, and do not depend on the benevolence of the company policies after the termination decision.

    Just so I am not entirely abstract, this is exactly what a certain Bradley Manning allegedly did while in employment of a certain large military organization.

  • Re:Simple Solution (Score:3, Informative)

    by TranquilVoid ( 2444228 ) on Wednesday June 13, 2012 @10:00PM (#40317899)

    It's the low-paid one which are honest

    The summary isn't quite accurate. The article states that the survey was mostly IT managers and executives, and the actual report PDF mentions that about 25% were "business/admin/technical staff" (i.e. regular workers), but there is no breakdown as to which group was less honest.

    Still, while I'd grant that managers might be more sociopathic, humans in general are quite corrupt. This sort of white-collar unethical behaviour is all too common as, unlike physical violence, it's very indirect as to the effects. This is why so many people cheat on their taxes, pirate software, take stationary etc. etc.

    The survey was also done by a company that sells data security products, for what it's worth.

  • by MobileTatsu-NJG ( 946591 ) on Thursday June 14, 2012 @01:05AM (#40319247)

    True, but you'd have to know that it happened. All the company has to do is say: "We're not interested at this time.", not: "We heard about what you did to the server, forget it."

  • by hey! ( 33014 ) on Thursday June 14, 2012 @02:06AM (#40319547) Homepage Journal

    As for still having access, I wouldn't know. That would require testing for it.

    I've never been fired, but I have left jobs where I had access to sensitive information. What I did was write an distribute memo which listed everything I could think of that I needed to be locked out of, then sat down on my last day with the person who was supposed to do it and made sure it happened.

    Protection is a two-way street. Not only does it protect my former employer from me, if anything happens after I leave it makes it less likely suspicion will fall on me. Besides that revenge is a juvenile act. It feels better to do the right thing and move on than to gloat over the power you wield over the people you left behind.

  • Re:Best Pratices (Score:5, Informative)

    by Neil_Brown ( 1568845 ) on Thursday June 14, 2012 @03:29AM (#40319885) Homepage

    If I develop code, on my own time, that I reuse at the workplace, whose code is it?

    Just my thoughts but, if your contact is not clear, I'd suggest getting this agreed in writing before you use it, particularly if, despite being developed on your own time, it was developed to solve a particular problem at that company. At the very least, make sure it has a licence attached, and use it in compliance with the licensing requirements, as if the company was any other third party recipient of the code — I'd aim to separate your two roles as (a) copyright owner and licensor of the code, and (b) employee of a company making use of third party code — if this means internal policy compliance of getting the licence checked out, the code use validated etc., then put the code through it..

    (I'm not a developer, although this is a question I've been asked several times by developers, but I work for my employer four days and week, and spend my fifth day pursuing my own academic interests. There's a clear cross-over, since I'm fortunate to be paid to do something which interests me, and so, in reusing work I've done in my academic life, I try to be as clear as possible what is created in the course of my employment, and what is not... Any other thoughts / suggestions would be very interesting to me!)

  • Re:Best Pratices (Score:5, Informative)

    by YttriumOxide ( 837412 ) <yttriumox@nOSpAm.gmail.com> on Thursday June 14, 2012 @04:36AM (#40320135) Homepage Journal

    As a developer, I was very sure to get very clear rules for this in my employment contract.

    Any code that I develop in my own time belongs to me. If I choose to use that code in a project at work, the company is given a royalty-free and warranty-free licence to use that code as they see fit. They may not however sub-license it, claim it as their own, or prevent me from using it in any way. All such code must be specifically marked as such, or it is assumed I created it on company time.

    My contract does however also specify that I can not compete with my employer while working here, and as such most of the code I do in private has little re-use value at work and vice-versa.

    Also, I've been with the same company for 10 years and will likely stay here for the rest of my working life, so I don't actually spend too much time thinking about it - it's just a safety precaution in case something does happen.

  • Re:Best Pratices (Score:3, Informative)

    by Reschekle ( 2661565 ) on Thursday June 14, 2012 @09:44AM (#40321869)
    To write proper documentation, I need to have access to the systems that you propose I should be shut off from. I don't have memory of the exact syntax of commands and etc. Further, if you don't trust employees with system access why do you trust them to be in the office to not do something untoward?

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...