Business Intelligence Slideshow: Data Thieves Walk Among Us

By Dennis McCafferty  |  Posted 09-03-2010

Data Thieves Walk Among Us

49 percent would look at a confidential file accessed inadvertently, including salary info, personal data or merger plans.

Data Thieves Walk Among Us

Data Thieves Walk Among Us - Page 2

Just one-third of those surveyed say they'd alert a manager about an inadvertently granted, confidential file-access mistake.

Data Thieves Walk Among Us - Page 2

Data Thieves Walk Among Us - Page 3

45 percent of U.S. survey participants would peek at confidential files, while 57 percent of U.K. survey participants say they'd do so.

Data Thieves Walk Among Us - Page 3

Data Thieves Walk Among Us - Page 4

Nearly one-half of survey participants admit that they would take some form of company property with them when leaving a position.

Data Thieves Walk Among Us - Page 4

Data Thieves Walk Among Us - Page 5

27 percent of survey participants say they'd take customer data - including contact information - when leaving a position.

Data Thieves Walk Among Us - Page 5

Data Thieves Walk Among Us - Page 6

23 percent of survey participants say they'd take electronic files when leaving a position.

Data Thieves Walk Among Us - Page 6

Data Thieves Walk Among Us - Page 7

16 percent of survey participants say they'd take product information, including designs and plans, when leaving a position.

Data Thieves Walk Among Us - Page 7

Data Thieves Walk Among Us - Page 8

16 percent of survey participants say they'd take small office supplies, like a stapler, when leaving a position.

Data Thieves Walk Among Us - Page 8

Data Thieves Walk Among Us - Page 9

46 percent of survey participants say the recession has not influenced a co-worker's tendency to steal from an employer.

Data Thieves Walk Among Us - Page 9

Data Thieves Walk Among Us - Page 10

Steps for IT Managers: Constantly educate employees about policies, which must be clearly defined with minimal gray areas.

Data Thieves Walk Among Us - Page 10

Data Thieves Walk Among Us - Page 11

Steps for IT Managers: Conduct quarterly reviews to ensure that only employees who truly need access get it.

Data Thieves Walk Among Us - Page 11

Data Thieves Walk Among Us - Page 12

Steps for IT Managers: Control access to apps and data; Automate access removal when employees change roles or leave company.

Data Thieves Walk Among Us - Page 12