sb-au logo
Story image

Impulsive Aussie workers creating a security risk, research finds

A new survey has found Australians are creating an unnecessary security risk for their employers by deliberately avoiding overworked IT teams in a bid to resolve workplace IT challenges themselves.

The Citrix Future of Work study commissioned looked at how 1000 Australian workers are accessing and engaging with enterprise technology, with a focus on their willingness to embrace new technologies.

The study found that 31% of todays Australian workers can be labelled as 'Impulsive technology personalities' - those who often seek out technology solutions to overcome challenges while avoiding support from IT teams with lengthy waiting times, posing a significant security risk to companies. 

Fifty seven percent of those surveyed admitted they would seek out free online tools, ask for help from somebody around them or struggle with existing tools when completing a new task, while 40% would disregard company security protocols and IT teams to access unsecured public Wi-Fi to get work done.

Almost half (46%) of Australian workers still agreed that new technology is vital to retaining business strength and driving employee efficiencies, and 77% were also open to embracing new applications if introduced by IT teams.

However, 24% did not believe technology should not be an end to itself, and one-third (33%)acknowledged they could do much more with the tools currently at their disposal if basic training programs were offered by companies.

Erin Butler, area vice president for Citrix Australia and New Zealand, says one of the best aspects of Australian companies is the regional push for innovation and new technology. 

"Our research has shown that Australian workers are not afraid of tackling the latest and greatest technology to get work done," she says. 

"However, where businesses have challenges is around ensuring employee security, compliance and availability. The data shows that large numbers of employees will use unsecured wifi networks and find their own workarounds simply to get work done," Butler explains.

"Organisations and IT leaders need to leverage design thinking to improve the employee experience, increase engagement, and if that is where organisations focus, user adoption will be more inherent," she says. 

"We see this in the consumer world, and we can emulate this in the business world."

The four technology personality types identified in the Citrix study, highlighting the varying expectations, attributes and requirements for workplace technology among Australian workers were:

The Impulsive (31%)

Impulsives are technology seekers with a good knowledge of IT and communication and will refuse the help of IT teams to resolve technological challenges.

The Challenger (27%)

Challengers are efficient and effective communicators that understand the positive impact of technology on their performance. They are not afraid of change.

The Learner (25%)

Learners express a lack of technological understanding but are keen to acquire new skills, because they recognise the importance of technology in working environments.

The Sceptic (17%)

Sceptics are comfort seekers who are poor at improving work performance through technology. They are effective communicators offline but require support in digital contexts.

Link image
Why metrics should always be front of mind for CTOs
Metrics can help businesses collaborate effectively with other senior stakeholders and act on large volumes of business and system performance data.More
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More
Link image
Gartner report: Why SD-WAN is becoming the de-facto option
Network service providers are increasingly challenged by established and new competition in the overlay SD-WAN management as well as in the underlay WAN transport, the report says.More
Story image
Emotet malware is on a rampage after months of silence
CERT agencies around the world are reporting a surge in cyber attacks related to the Emotet malware, which is being distributed by email.More
Story image
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.More
Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.More