Close Menu
Alan C. Moore
    What's Hot

    ‘So dumb it hurts’: Jasmine Crockett slammed for calling GOP ‘inherently violent’

    May 9, 2025

    Oregon’s underwater volcano rumbles to life, may erupt soon: Scientists

    May 9, 2025

    Trump fires librarian of Congress Carla Hayden, outraging Democrats

    May 9, 2025
    Facebook X (Twitter) Instagram
    Trending
    • ‘So dumb it hurts’: Jasmine Crockett slammed for calling GOP ‘inherently violent’
    • Oregon’s underwater volcano rumbles to life, may erupt soon: Scientists
    • Trump fires librarian of Congress Carla Hayden, outraging Democrats
    • Golden State rising: California cities pivot from progressive policies and see results
    • Golden State rising: California cities pivot from progressive policies and see results
    • Asian American group alleges Yale still discriminating on basis of race
    • UMinn PhD wins grant to develop ‘queering Europe’ course
    • ‘Hip-hop pedagogy’: FIU course teaches about ‘black ratchet imagination’ and ‘sexuality’
    Alan C. MooreAlan C. Moore
    Subscribe
    Friday, May 9
    • Home
    • US News
    • Politics
    • Business & Economy
    • Video
    • About Alan
    • Newsletter Sign-up
    Alan C. Moore
    Home » Blog » Employee Data Access Behaviors Putting Australian Employers At Risk

    Employee Data Access Behaviors Putting Australian Employers At Risk

    December 6, 2024Updated:December 6, 2024 Tech No Comments
    AdobeStock jpg
    AdobeStock jpg
    Share
    Facebook Twitter LinkedIn Pinterest Email

    More than 60 % of Australian employees admit to bypassing their company’s security policies for comfort, according to id security contractor CyberArk. Additionally, many people use non-secure specific equipment to access work programs.

    The CyberArk 2024 Employee Risk Survey, which polled 14, 003 employees across the U. S., U. K., France, Germany, Australia, and Singapore in October 2024, revealed that American workers typically agree more with security policies than other countries.

    Nevertheless, most are still bypassing computer plans to make their lives easier. Popular workarounds discovered by American employees included using one login across multiple accounts, using individual devices as WiFi hotspots, and forward business emails to personal accounts.

    Notice: American employees choosing comfort, speed over digital security

    According to CyberArk’s CEO Matt Cohen, the entire findings of the report reveal that “high-risk access is dispersed throughout every work role,” possibly putting sensitive organisational data at greater risk.

    American workers have access to sensitive information from individual devices.

    According to the CyberArk report, the majority of Australian employees ( 80 % ) use personal devices that frequently lack adequate security controls to access business-critical data on their personal devices. This level of personal computer consumption is considerably higher than the average of 60 % worldwide.

    The most prevalent use of personal devices to access work applications was found to be by marketing departments (93 % ), followed by IT teams (93 % ). Concerningly, more than half ( 52 % ) of entry-level employees already had access to critical data with the workplace tools they used.

    Australians are among the slowest to upgrade their personal unit security

    When vendors release firmware improvements or security patches for their personal or Personal devices, American workers were found to be among the slowest to do so worldwide.

    Over a third ( 36 % ) of employees surveyed said they do not install security patches or software updates for all of their personal devices right away. In contrast, 26 % disagreed they generally use a VPN when they access function assets, increasing the risk of attacks.

    Employees are a lot more likely to have access to actions that are useful for attackers.

    According to the report, numerous different employees can accomplish tasks that would be viewed as extremely valuable by hackers stealing their accounts by having common privileged access to systems:

    • 40 % of worldwide respondents said they regularly download user data.
    • 33 % of people are capable of changing sensitive or important files.
    • 30 % is review big financial transactions.

    More Australia cover

    American workers have a problem with password modify policies.

    Password utilize was even common worldwide. According to the report, 49 % of the respondents ‘ login certificates were used for a variety of work-related programs. 33 % of Australian employees choose to log into both personal and business applications and services using the same password qualifications.

    Globally, 41 % of surveyed people said they have shared workplace-specific personal data with outside events, which CyberArk said heightened the risk of safety leaks and vulnerabilities.

    SEE: The pace of passkey adoption is lagging in Australia

    Worldwide, productivity is being prioritized over cybersecurity policies.

    Employees around the world are also avoiding cybersecurity regulations to avoid conflict. Among global respondents to CyberArk’s survey:

    • 20 % were using personal devices as Wi-Fi hotspots.
    • 18 % avoided updating because it took too long.
    • 18 % use personal devices regularly instead of company-issued ones.
    • 17 % forward corporate emails to personal email accounts.

    Some Australian employees don’t follow the rules for using AI tools.

    It was discovered that more than 66 % of Australian workers were using AI tools. However, CyberArk cautioned that AI tools can introduce new vulnerabilities, such as when a worker uses sensitive data inside of them.

    Nearly 25 % of Australian employees admit to occasionally using AI tools that are unapproved or unmanaged by the organization. This behavior seems to be occurring among Australian employees.

    SEE: Splunk urges Australian businesses to obtain LLMs.

    Additionally, over a third ( 33 % ) of Australian employees say they either “only sometimes” or “never” adhere to guidelines on handling sensitive information in their use of AI tools.

    IT and security experts advise employees to follow best practices.

    Post-authentication breaches are expected to become even more frequent as Australian organizations continue to move workflows to the cloud, according to Thomas Fikentscher, CyberArk’s area vice president for ANZ. He argued that businesses shouldn’t rely solely on MFA to stop deceptive activity.

    Additionally, according to the CyberArk report, organizations should adopt strategies that empower rather than slow down risky employee behaviors. Security teams must acknowledge that AI is still relevant and that future security controls should be upgraded to take into account AI use in light of the rapid growth in AI use, according to CyberArk.

    Source credit

    Keep Reading

    US Changes to Biden-Era AI Chips Export Rule Expected Soon: Who Benefits?

    US Changes to Biden-Era AI Chips Export Rule Expected Soon: Who Benefits?

    Apple Might Add AI-Powered Results in Safari, Weakening Google’s Search Dominance

    Singapore’s Vision for AI Safety Bridges the US-China Divide

    OpenAI for Countries Offers ‘A Clear Alternative to Authoritarian Versions of AI’

    SAS Says ‘Goodbye, GenAI; Hello, Agentic AI’

    Editors Picks

    ‘So dumb it hurts’: Jasmine Crockett slammed for calling GOP ‘inherently violent’

    May 9, 2025

    Oregon’s underwater volcano rumbles to life, may erupt soon: Scientists

    May 9, 2025

    Trump fires librarian of Congress Carla Hayden, outraging Democrats

    May 9, 2025

    Golden State rising: California cities pivot from progressive policies and see results

    May 9, 2025

    Golden State rising: California cities pivot from progressive policies and see results

    May 9, 2025

    Asian American group alleges Yale still discriminating on basis of race

    May 9, 2025

    UMinn PhD wins grant to develop ‘queering Europe’ course

    May 9, 2025

    ‘Hip-hop pedagogy’: FIU course teaches about ‘black ratchet imagination’ and ‘sexuality’

    May 9, 2025

    Pro-Palestinian protesters at Columbia occupy library, 78 arrested, two officers injured

    May 9, 2025

    Turning Colorado into California: Damage from left-wing wins is mounting

    May 9, 2025
    • Home
    • US News
    • Politics
    • Business & Economy
    • About Alan
    • Contact

    Sign up for the Conservative Insider Newsletter.

    Get the latest conservative news from alancmoore.com [aweber listid="5891409" formid="902172699" formtype="webform"]
    Facebook X (Twitter) YouTube Instagram TikTok
    © 2025 alancmoore.com
    • Privacy Policy
    • Terms
    • Accessibility

    Type above and press Enter to search. Press Esc to cancel.