{"id":1800,"date":"2005-03-17T00:00:00","date_gmt":"2005-03-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/17\/whos-forwarding-all-those-dumb-e-mail-jokes-more-than-half-of-us\/"},"modified":"2021-12-30T11:40:01","modified_gmt":"2021-12-30T11:40:01","slug":"whos-forwarding-all-those-dumb-e-mail-jokes-more-than-half-of-us","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/17\/whos-forwarding-all-those-dumb-e-mail-jokes-more-than-half-of-us\/","title":{"rendered":"Who&#8217;s Forwarding All Those Dumb E-Mail Jokes? More Than Half Of Us"},"content":{"rendered":"<p>More than half of employees admit to inappropriate uses of business E-mail, and IT people are more likely than others to E-mail confidential company info.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than half of employees&#8211;including many IT workers&#8211;admit they misuse company E-mail systems for activities such as swapping lewd jokes, downloading pirated software, responding to spam, or forwarding confidential company information, according to new survey findings released this week.<\/p>\n<p>Approximately 4,500 people from the United States, the United Kingdom, and Germany participated in the online survey, &#8220;E-Mail Use At Work,&#8221; conducted in December by content-security software vendor Clearswift Ltd.  <\/p>\n<p>IT workers are among the culprits circulating inappropriate material, including sexual or discriminatory jokes, the survey finds.  Twenty-seven percent of U.S. and German IT personnel admitted distributing inappropriate material to colleagues.  A slightly higher percentage of IT workers in the U.K. admitted E-mailing bawdy material, 31%.  The U.K. also had the highest percentage&#8211;55%&#8211;of non-IT workers admitting to participating in such activity.<\/p>\n<p>IT employees were more likely than non-IT workers overall to admit distributing confidential information via corporate E-mail systems.<\/p>\n<p>Findings from that same Clearswift survey also revealed that 40% of workers in all three countries admit spending an hour or more every day using company E-mail systems for non-work related activities.<\/p>\n<p>In the late 1990s, companies began paying more attention to the content coming into their business networks as they battled malicious code such as worms, viruses, and spam, says a Clearswift spokeswoman.  Now, the trend among big companies is to pay closer attention to the content coming out of their systems, she says.<\/p>\n<p>http:\/\/www.informationweek.com\/showArticle.jhtml;jsessionid=ASHSOZUL0AZH0QSNDBNSKH0CJUMEKJVN?articleID=159901599<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1800","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1800"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1800\/revisions"}],"predecessor-version":[{"id":4287,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1800\/revisions\/4287"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}