- Major Studies
- Advisory Reports
- Valuation Data
This report is based on our survey of IT security professionals and IT executives worldwide. It analyzes the threat misuse of computing resources by employees and other insiders--that is, any violation of an organization's policies regarding acceptable use. Examples include non-work-related Internet surfing, use and abuse of personal email or instant messaging, downloading of music or pirated software, or unauthorized copying of files to portable storage devices such as USB drives.
For each of 14 types of insider misuse, we present data concerning the perceived seriousness of the threat, typical organizational policies or lack thereof, frequency of violations against company policy, analysis of preventive and detective actions taken by organizations to deter employee abuse (such as employee monitoring and workplace surveillance), and typical levels of enforcement.
Read the free executive summary of this report
Table of Contents
List of Figures