Nashville, Tenn – (BUSINESS WIRE) – February 23, 2022–
Distance learning during the pandemic has transformed the education industry into a technology industry. But while the government has poured money into schools to accelerate distance learning, cybersecurity and security awareness have not been top priorities. According to a new study, 42 percent of employees in the education industry admit that they find ways to circumvent security policy, and 77 percent value their personal privacy above company security. The study also proves that password hygiene among employees is risky, adaptation of new employees is ineffective, and Shadow IT gets out of control.
The report, commissioned by Mobile Mentor and presented by CGK, is the first study to look at the endpoint ecosystem as a key to understanding how employees perceive privacy, productivity and personal well-being in the modern workplace. The study identifies the endpoint ecosystem as a combination of all devices, applications and tools, and the experience of using this technology by employees. The study presents an innovative view of the trade-off between safety and employee experience that every employer must face.
“I am heartbroken to see cybercriminals target schools and universities during the pandemic – as if they didn’t have enough to do,” said Denis O’Shea, founder of Mobile Mentor. “Password hygiene is a bigger problem than we thought. I was shocked to see that 31 percent of people write their work passwords in a personal journal, and most people admit to choosing passwords that are easy to remember. ”
Research shows that the endpoint ecosystem determines an employee’s path from the day he or she started work, and includes the process of adapting to the last day when their accounts are recalled. Navigating in trade-offs between endpoint security and staff experience has always been challenging, but it has become critical in this post-pandemic world.
“Shadow IT is getting out of control in education. People confuse their work and personal devices by using applications that have not been approved by IT and bypassing their organization’s security policies, ”O’Shea added.
The study also highlights the following findings specific to the education industry:
- Passwords are poorly managed and are a huge responsibility. Only 26 percent of educators use a password management tool. Thirty-one percent of employees write down their work passwords in a personal diary, and 67 percent admit to choosing passwords that are easy to remember.
- Shadow IT got out of control. Employees regularly use unapproved work programs that may contain sensitive data. More than 46 percent of employees say security policy is restrictive, and 42 percent admit to finding ways to circumvent security policy. Fifty-seven percent of employees believe they use non-working programs such as Dropbox and Gmail more efficiently.
- The process of adapting an employee is inconvenient. Setting up a laptop for a remote employee takes an average of three days and requires more than three calls to technical support. Employees are not happy. Only 17 percent of educators are very satisfied with IT support.
- Security policy is not seen or noticed by educators. Less than half of respondents see a security policy every time they log in, and about 20 percent say they do not remember ever seeing a security policy.
- The risk of using personal devices has not been addressed in education. Eighty-nine percent of employees use personal devices for work, but only 47 percent of those devices are safely enabled.
- Seventy-seven percent of people in education believe their privacy is more important than school safety.
In late 2021, Mobile Mentor commissioned CGK to study 1,500 employees in four high-risk and highly regulated areas: healthcare, finance, education and government. Employees were in the United States and Australia. Each interview consisted of 25 questions to understand how employees used the devices in the world after the pandemic. The aim of the study is to collect data to educate and inform employers about how tools are used in their fields, how to prevent security breaches and how best to support productive employees.
For a full report visit www.endpointecosystem.com.
About the mobile teacher:
Mobile Mentor provides and maintains a mobile workforce. The company helps customers find the right balance between corporate security and employee experience. Mobile Mentor protects all devices (laptops, tablets and smartphones) and enables employees to be productive. The company is certified by Microsoft, Apple and Google. Their goal is to help their customers become a modern enterprise without passwords, servers and paper. Founded in 2004, Mobile Mentor is Microsoft’s Best Partner and Gold Partner with offices in New Zealand, Australia and the United States. For more information, visit www.mobile-mentor.com.
The Genetics Kinetics Center is a research, conversational, and consulting firm that separates myth from truth through data. CGK has conducted more than 65 studies in several languages on four continents. Their clients are many of the most famous brands in the world, as well as private investment companies and startups that shape the market. CGK members have been featured in hundreds of media outlets, from the cover of The New York Times to more than 200 television appearances on shows such as 60 Minutes and The Today Show. Adweek called their president a “research guru”.
The content of this study is freely available to the general public. You can share any single data point (or small groups of data points) in presentations, podcasts, radio shows, reports, articles, blog posts, etc. Please always mention the source of the “national survey conducted by Mobile Mentor”.
See the original version at businesswire.com: https://www.businesswire.com/news/home/20220223005789/en/
CONTACT: Beth Talent
KEYWORD: Tennessee Australia / Oceania Australia United States North America
INDUSTRY KEYWORD: MOBILE / WIRELESS TECHNOLOGY OF KORAD RESOURCES SECURITY
SOURCE: Mobile Mentor
Copyright Business Wire 2022.
PUB: 23.02.2022 10: 05 / DISK: 23.02.2022 10:06
Copyright Business Wire 2022.