SHARE
Facebook X Pinterest WhatsApp

The Worst Security Offenders? IT Pros

Nov 13, 2015

The Worst Security Offenders? IT Pros

The Worst Security Offenders? IT ProsThe Worst Security Offenders? IT Pros

Seriously, techies? IT professionals’ security habits pose the greatest risk at work, according to a recent survey.

IT Professionals Compared to OthersIT Professionals Compared to Others

65% of IT professionals share Web logins with many users, compared to 46% of employees across all functions.

Personal Password UsePersonal Password Use

52% of IT professionals use their personal passwords for business apps compared to 40% of other employees.

Sharing Logins and PasswordsSharing Logins and Passwords

32% of IT professionals have given their login/password to another employee, compared to 19% of other employees.

Installing Apps Without Consulting ITInstalling Apps Without Consulting IT

Asked whether it’s OK to install applications on their computer without consulting the IT department, 59% of IT professionals said yes, compared to 73% of all respondents.

Attitudes Towards Confidential InformationAttitudes Towards Confidential Information

56% of IT professionals said they would copy confidential company information when leaving their current job—about twice the rate of general business professionals.

Accessing Systems After Leaving a JobAccessing Systems After Leaving a Job

28% of IT pros said they have accessed systems belonging to previous employers after they left their job, compared to 13% of all respondents.

Millennials Install Apps Without PermissionMillennials Install Apps Without Permission

41% of Millennials think it’s fine to install applications on their work computer without consulting the IT department.

Millennials and Personal Passwords for BusinessMillennials and Personal Passwords for Business

50% of Millennials use personal passwords for business applications, compared to 38% for Gen Xers and 32% of Baby Boomers.

Tenured EmployeesTenured Employees

If tenured employees leave their current job, they are nine times more likely to access their company’s information after they leave.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.