{"id":1924,"date":"2007-10-12T00:00:00","date_gmt":"2007-10-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/10\/12\/survey-office-workers-still-the-greatest-security-threat\/"},"modified":"2021-12-30T11:40:18","modified_gmt":"2021-12-30T11:40:18","slug":"survey-office-workers-still-the-greatest-security-threat","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/10\/12\/survey-office-workers-still-the-greatest-security-threat\/","title":{"rendered":"Survey: Office workers still the greatest security threat"},"content":{"rendered":"<p>Businesses still consider desktop users to be the biggest security risk to their networks, despite increased concern over outsourced labor and remote users.  Such users were considered the greatest threat to security by 44 percent of respondents.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While office-bound employees have consistently topped the list of those thought most likely to compromise network security in past surveys, they have lost some ground to remote and mobile employees, who are considered to be a greater security threat by 31 percent of respondents.<\/p>\n<p>Sophos&#8217; head of technology, Paul Ducklin, said, &#8220;This is a representation of how common telecommuting and remote working has become,&#8221; to the extent that half of those in the office are also remote workers.<\/p>\n<p>http:\/\/news.zdnet.com\/2100-1009_22-6213227.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1924","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1924"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1924\/revisions"}],"predecessor-version":[{"id":4411,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1924\/revisions\/4411"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}