• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Security First Associates

Security Clearance CAN Change Your Life!

  • Home
  • About
    • Community Service
    • Media Room
    • Press Releases
      • Griffin wins Sam Walton Emerging Entrepreneurs Awards; Company will receive full package of Financial and Other Assistance Columbia, MD
      • Top Entrepreneur in Security Field spotlighted by National Magazine; Self-Employed “Secret Agent” Griffin for tips.
      • NCMS Society Award for 2020
    • Testimonials
  • Sign In Compliance
  • Our Services
  • Managed Security Support
  • RMF Help
  • FSO & AFSO Help
  • Facility Clearance Help
  • Shop
    • Social Media Secrets Every Parent of College Bound Teens Must Know
    • Protecting Your Teens on Facebook
    • Safe Text: Protecting Your Teens from the Dangers of Texting
  • Blog
  • Contact
You are here: Home / Uncategorized / HOW EMPLOYEES GET AROUND IT SECURITY POLICIES AND RESTRICTIONS

June 23, 2014 By Diane

HOW EMPLOYEES GET AROUND IT SECURITY POLICIES AND RESTRICTIONS

Because of mobile devices, cloud services, mobile apps and mobile WiFi hotspots, employees can get around the most stringent IT security policies.

Many companies have a mixture of personal and corporate-owned devices.

Companies also have a mixture of IT policies that apply to each.

Some businesses also have some kind of enterprise mobility management (EMM) tool to enforce those policies and monitor devices, data and apps.

Some businesses have bring-your-own-device or security policies that outline usage rules for employees who use their personal devices for work.

Despite IT policies and restrictions, employees want to use personal devices for work because it allows them to be more productive.

Agreeing to IT-enforced policies usually gives employees the ability to access company email, use remote desktop tools or virtualization to access their files and use company-approved apps.

Breaches can occur when employees store company information in third-party cloud services or when they use a blacklisted app or other device that does not meet the company guidelines.

Employees who violate policies usually do so to be more productive. e.g., many companies require workers to “remote-in” to access files from a mobile device. An employee may find it easier to store those files in a personal Dropbox account and then access them from anywhere, even though that action may violate a corporate IT security policy.

The Threat is REAL!

Filed Under: Uncategorized

Primary Sidebar

Let’s Connect

  • Email
  • Facebook
  • LinkedIn
  • Twitter

Join Our Mailing List

FREE! What’s In It For Me? How Security Clearance Can Change Your Life eBook!

Recent Posts

  • The Clearance Headache: Why Small Businesses Struggle with Security Clearances
  • Top 3 Mistakes Companies Make When Applying for Their Facility Clearance (FCL)
  • Hoops and Heroes: Facility Security Officers & March Madness Compliance
  • A Quick Stress Break
  • Looking for Love? Be Aware of Romance Scams!

Footer

Have A Question?

Security First & Associates

5850 Waterloo Road

Suite 140

Columbia, MD 21045

Toll Free: 866-661-5211

Quick Links

Are You Ready for Managed Security Support Services?
Managed Security Support Application

Let’s Connect

  • Email
  • Facebook
  • LinkedIn
  • Twitter

Home | About Us | Our Services | Blog | Privacy Policy

Copyright © 2011 - 2018 Security First Associates · All Rights Reserved