Close Menu
Alan C. Moore
    What's Hot

    Trump suggests anger management for ‘young, angry’ Greta Thunberg after Israel seizes Gaza aid ship

    June 9, 2025

    ‘Clean sweep needed’: RFK Jr fires vaccine advisory board; AMA calls move ‘undermining trust’

    June 9, 2025

    Minnesota state lawmaker claims on House floor she is in the US illegally

    June 9, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Trump suggests anger management for ‘young, angry’ Greta Thunberg after Israel seizes Gaza aid ship
    • ‘Clean sweep needed’: RFK Jr fires vaccine advisory board; AMA calls move ‘undermining trust’
    • Minnesota state lawmaker claims on House floor she is in the US illegally
    • Billie Eilish’s brother Finneas says he was tear-gassed during LA ICE protest
    • Hundreds of Marines mobilizing to Los Angeles
    • Illegal Aliens Violently Rioting in L.A. Is The Natural Consequence Of Democrat Rule
    • Trump-Musk thaw: President says he won’t dump his Tesla, nor get rid of Starlink at the White House
    • Donald Trump reacts to ‘kidnapping’ of Greta Thunberg: ‘She should do anger management’
    Alan C. MooreAlan C. Moore
    Subscribe
    Monday, June 9
    • Home
    • US News
    • Politics
    • Business & Economy
    • Video
    • About Alan
    • Newsletter Sign-up
    Alan C. Moore
    Home » Blog » Employee Data Access Behaviors Putting Australian Employers At Risk

    Employee Data Access Behaviors Putting Australian Employers At Risk

    December 6, 2024Updated:December 6, 2024 Tech No Comments
    AdobeStock jpg
    AdobeStock jpg
    Share
    Facebook Twitter LinkedIn Pinterest Email

    More than 60 % of Australian employees admit to bypassing their company’s security policies for comfort, according to id security contractor CyberArk. Additionally, many people use non-secure specific equipment to access work programs.

    The CyberArk 2024 Employee Risk Survey, which polled 14, 003 employees across the U. S., U. K., France, Germany, Australia, and Singapore in October 2024, revealed that American workers typically agree more with security policies than other countries.

    Nevertheless, most are still bypassing computer plans to make their lives easier. Popular workarounds discovered by American employees included using one login across multiple accounts, using individual devices as WiFi hotspots, and forward business emails to personal accounts.

    Notice: American employees choosing comfort, speed over digital security

    According to CyberArk’s CEO Matt Cohen, the entire findings of the report reveal that “high-risk access is dispersed throughout every work role,” possibly putting sensitive organisational data at greater risk.

    American workers have access to sensitive information from individual devices.

    According to the CyberArk report, the majority of Australian employees ( 80 % ) use personal devices that frequently lack adequate security controls to access business-critical data on their personal devices. This level of personal computer consumption is considerably higher than the average of 60 % worldwide.

    The most prevalent use of personal devices to access work applications was found to be by marketing departments (93 % ), followed by IT teams (93 % ). Concerningly, more than half ( 52 % ) of entry-level employees already had access to critical data with the workplace tools they used.

    Australians are among the slowest to upgrade their personal unit security

    When vendors release firmware improvements or security patches for their personal or Personal devices, American workers were found to be among the slowest to do so worldwide.

    Over a third ( 36 % ) of employees surveyed said they do not install security patches or software updates for all of their personal devices right away. In contrast, 26 % disagreed they generally use a VPN when they access function assets, increasing the risk of attacks.

    Employees are a lot more likely to have access to actions that are useful for attackers.

    According to the report, numerous different employees can accomplish tasks that would be viewed as extremely valuable by hackers stealing their accounts by having common privileged access to systems:

    • 40 % of worldwide respondents said they regularly download user data.
    • 33 % of people are capable of changing sensitive or important files.
    • 30 % is review big financial transactions.

    More Australia cover

    American workers have a problem with password modify policies.

    Password utilize was even common worldwide. According to the report, 49 % of the respondents ‘ login certificates were used for a variety of work-related programs. 33 % of Australian employees choose to log into both personal and business applications and services using the same password qualifications.

    Globally, 41 % of surveyed people said they have shared workplace-specific personal data with outside events, which CyberArk said heightened the risk of safety leaks and vulnerabilities.

    SEE: The pace of passkey adoption is lagging in Australia

    Worldwide, productivity is being prioritized over cybersecurity policies.

    Employees around the world are also avoiding cybersecurity regulations to avoid conflict. Among global respondents to CyberArk’s survey:

    • 20 % were using personal devices as Wi-Fi hotspots.
    • 18 % avoided updating because it took too long.
    • 18 % use personal devices regularly instead of company-issued ones.
    • 17 % forward corporate emails to personal email accounts.

    Some Australian employees don’t follow the rules for using AI tools.

    It was discovered that more than 66 % of Australian workers were using AI tools. However, CyberArk cautioned that AI tools can introduce new vulnerabilities, such as when a worker uses sensitive data inside of them.

    Nearly 25 % of Australian employees admit to occasionally using AI tools that are unapproved or unmanaged by the organization. This behavior seems to be occurring among Australian employees.

    SEE: Splunk urges Australian businesses to obtain LLMs.

    Additionally, over a third ( 33 % ) of Australian employees say they either “only sometimes” or “never” adhere to guidelines on handling sensitive information in their use of AI tools.

    IT and security experts advise employees to follow best practices.

    Post-authentication breaches are expected to become even more frequent as Australian organizations continue to move workflows to the cloud, according to Thomas Fikentscher, CyberArk’s area vice president for ANZ. He argued that businesses shouldn’t rely solely on MFA to stop deceptive activity.

    Additionally, according to the CyberArk report, organizations should adopt strategies that empower rather than slow down risky employee behaviors. Security teams must acknowledge that AI is still relevant and that future security controls should be upgraded to take into account AI use in light of the rapid growth in AI use, according to CyberArk.

    Source credit

    Keep Reading

    Apple’s WWDC Keynote: iOS 26 & macOS Tahoe 26 Includes New Liquid Glass Design Language

    Apple’s WWDC Keynote: iOS 26 & macOS Tahoe 26 Includes New Liquid Glass Design Language

    New OpenAI Sora & Google Veo Competitor Focuses on Storytelling With Its Text-to-Video Tool

    Trump/Musk Feud: Possible Impact on AI Regulation, Budget Bill, Government Contracts

    Mistral’s New AI Tool Offers ‘Best-in-Class Coding Models’ to Enterprise Developers

    Mistral’s New AI Tool Offers ‘Best-in-Class Coding Models’ to Enterprise Developers

    Editors Picks

    Trump suggests anger management for ‘young, angry’ Greta Thunberg after Israel seizes Gaza aid ship

    June 9, 2025

    ‘Clean sweep needed’: RFK Jr fires vaccine advisory board; AMA calls move ‘undermining trust’

    June 9, 2025

    Minnesota state lawmaker claims on House floor she is in the US illegally

    June 9, 2025

    Billie Eilish’s brother Finneas says he was tear-gassed during LA ICE protest

    June 9, 2025

    Hundreds of Marines mobilizing to Los Angeles

    June 9, 2025

    Illegal Aliens Violently Rioting in L.A. Is The Natural Consequence Of Democrat Rule

    June 9, 2025

    Trump-Musk thaw: President says he won’t dump his Tesla, nor get rid of Starlink at the White House

    June 9, 2025

    Donald Trump reacts to ‘kidnapping’ of Greta Thunberg: ‘She should do anger management’

    June 9, 2025

    Saudi Arabia resumes Umrah visa issuance from June 10: What pilgrims need to know

    June 9, 2025

    Los Angeles ICE protests: Key players involved

    June 9, 2025
    • Home
    • US News
    • Politics
    • Business & Economy
    • About Alan
    • Contact

    Sign up for the Conservative Insider Newsletter.

    Get the latest conservative news from alancmoore.com [aweber listid="5891409" formid="902172699" formtype="webform"]
    Facebook X (Twitter) YouTube Instagram TikTok
    © 2025 alancmoore.com
    • Privacy Policy
    • Terms
    • Accessibility

    Type above and press Enter to search. Press Esc to cancel.