Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:56 AM

What Are Your Employees Doing on the Road?

Trust can be a trait that takes long time to develop but can be quickly broken. If your company trusts its employees to use the Internet judiciously on the road, then it may be time to rethink that position.

Trust can be a trait that takes long time to develop but can be quickly broken. If your company trusts its employees to use the Internet judiciously on the road, then it may be time to rethink that position.The notion that individuals will try to get away with as much as possible if no one is looking was confirmed in a recent survey by ScanSafe, a software-as-a-service Web monitoring vendor. The company compared Internet usage patterns by individuals working in the office to those stationed remotely. Mobile workers visit illegal file sharing sites 8.5 times more often; extreme websites (sites with extremely graphic content) 5.2 times more frequently; illegal activities sites (for example sites with information on building explosives) 3.9 times more often; and pornography sites 2.5 times more frequently than coworkers huddled in an office.

There are a couple of possible reasons for the discrepancy. Perhaps, remote workers think that no one is watching what they are doing because they are out of the office. Maybe, their inhibitions about someone walking by and viewing what is on their screen disappear because they are not sitting in a public place. Perhaps, they are using company computers to view these materials on what they regard as their own personal time on the road.

Regardless of the underlying rationale, remote users viewing habits create a couple of problems for small and medium businesses. The fact that so many of these workers are visiting illegal file sharing sites leaves their employer open to possible legal prosecution for the offense. The discrepancy also means that remote workers are not as productive as they could be.

ScanSafe obviously wants companies to use its services to bring the remote usage patterns in line with their office co-workers, and such services can be helpful in achieving that goal. In addition, small and medium businesses need to educate their employees about the proper use of company computers, especially when they are on the road. Maybe then, employees will prove worthy of your trust.

How many of your employees work remotely? What security checks do you have in place for them? Would you be surprised if their viewing patterns differed from individuals working in the office?

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-17
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.
PUBLISHED: 2021-06-17
Wagtail is an open source content management system built on Django. A cross-site scripting vulnerability exists in versions 2.13-2.13.1, versions 2.12-2.12.4, and versions prior to 2.11.8. When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`Ch...
PUBLISHED: 2021-06-17
Elemin allows remote attackers to upload and execute arbitrary PHP code via the Themify framework (before 1.2.2) wp-content/themes/elemin/themify/themify-ajax.php file.
PUBLISHED: 2021-06-17
An authenticated Stored XSS (Cross-site Scripting) exists in the "captive.cgi" Captive Portal via the "Title of Login Page" text box or "TITLE" parameter in IPFire 2.21 (x86_64) - Core Update 130. It allows an authenticated WebGUI user with privileges for the affected p...
PUBLISHED: 2021-06-17
In Fiyo CMS, the 'tag' parameter results in an unauthenticated XSS attack.