Story image

Dell survey: Australians better than most about sharing confidential information

01 May 2017

Australian employees are likely to share confidential information in certain circumstances and yet they are more likely to be aware of the dangers compared to their global counterparts, a new study from Dell has found.

The End-User Security Survey, conducted across eight countries, found that Australian employees will share confidential information for many reasons, but 55% also confident they are able to protect their data.

Employees said they would share data if they were sharing with an authorised person (35%); asked to do so by management (33%); help them or the recipient do their job better (18%); or if the risk to the company was low and the sharing benefit was high (8%).

Globally, 81% of financial services employees would share confidential information, alongside 75% in education, 68% in healthcare and 68% federal government.

45% of Australian respondents said that third party vendors or consultants had no access to company information, compared to the global average of 27%.

In India, only 7% of respondents said they never share company information. In contrast, 77% of Indian respondents said they had to complete training on sensitive data protection, compared to only 54% of Australians and 55% of Japanese respondents.

“When security becomes a case-by-case judgement call being made by the individual employee, there is no consistency or efficacy,” said Brett Hansen, vice president of Endpoint Data Security and Management at Dell. 

Fourteen percent of Australians said there was non-mandatory training and 32% said there was no training whatsoever.

“These findings suggest employees need to be better educated about data security best practices, and companies must put procedures in place that focus first and foremost on securing data while maintaining productivity,” Hansen says.

However, 69% of global respondents believe that they must protect sensitive information, which includes self-education about possible risks.

Forty-five percent of global employees admit that they have conducted unsafe behaviours throughout their workday, such as accessing confidential information through public wifi, using personal email accounts at work or losing a company-issued device.

In addition, 56% use public cloud services such as Dropbox, Google Drive, iCloud and others to share or backup their work.

“Creating simple, clear policies that address these common scenarios in addition to deploying endpoint and data security solutions is vital in order to achieve that balance between protecting your data and empowering employees to be productive,” Hansen says.

Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Deakin Uni scores double win with Exabeam partnership
Australia’s Deakin University is partnering with SIEM security company Exabeam in an effort to boost the university’s cybersecurity degree program and strengthen its SIEM capabilities.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Voter vulnerabilities: Cybersecurity risks impact national elections
The outcome of elections have an enormous impact on the political and cultural landscape of any democratic society. 
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."