Survey: Split IT specialists allows end users to download, install the Software.
In their efforts to keep the malware on their networks, some professional restrict end-users andsecurity right to installing application company cars and more in order to limit individual applications that are allowed in the network, the study said.
Companies are mainly parts of the user Anwendungen–51% Yes can install, 49% no, according to a survey of 765 professionals about security manufacturers allow Bit9.Seventy four percent of the companies surveyed only software from a list approved by the business, and 23% will only software, that the company is actually provided.
About half of the administrative rights to less than 20 per cent of users, and only 11 per cent, of these rights to all users. Seven percent of administrative rights for all users. Limit administrative permissions is the most popular method of the control or to prevent unauthorized software are not the only way. Written guidance to honor employees confidence used by half of the respondents according to the survey.
He responded, 45% of the software for the digital music business machines, they are located at 44% said social media software and 43% have a chat. 36% of respondents found by spyware and viruses and other malicious software found 32% of corporate machines, he said.
When the terrorist attacks on the four options and it is called this fear, 60% said, will benefit from zero day attacks, which leads to the theft of intellectual property, copyright and other intellectual property rights. Interested less in the theft of personal and company information Editor (28%) Hacking and a threat to the company's email (26%) and information about the customer, vendor, because the program denied security Cloud Hacking (25%).
About one-third of answerers say they don ' t let employees use their own mobile twist for operate. 41% permits them but only in quarantined public networks. 27% allow these twist to connect to your company's net, "said the survey.