Securing Information
Strengthening Business

The Human Face of Information Risk – Is There a Gender Issue?

Part 2 of our mini blog series about the Human Face of Information Risk. This blog looks at whether there are any gender specific issues the HR department needs to consider.

Gender had a minimal impact on the responses to questions asked on employees sabotaging their employers business. Any out-dated or stereotypical views of women as passive or loyal in the workforce are forcefully refuted by the research. There is nothing in these findings to suggest that gender-specific controls are required as part of Information Risk Management.

Why would you compromise the company you work for?

Have you ever sabotaged or compromised the company you work for?


Females Yes: 6.2% (No: 93.8%) Males Yes: 7.8% (No: 92.2%)

 

Have any of your colleagues ever deliberately sabotaged or compromised your company?

As they were talking about a third party, we cannot determine the gender of the person to whom they are referring. As such, findings are not reported.

If you were to deliberately sabotage or compromise your company, would you…

 

There are more variations in the statistics when you look at other criteria such as staff age ranges, where people work and the industry sectors they work in.

To find out more about the human factor of Information Security come along to Ascentor’s seminar. Simon Moore from the CBI and Gordon Morrison from Intellect, together with Ascentor’s MD, Dave James will be discussing the results and how to protect your company’s information. The Human Face of Information Risk – The Bristol Hotel – Thursday, 6th September 2012 .

For Further Information

If you have any questions about the topics we've covered, or would like to have a chat about any aspect of your own cyber security strategy, please get in touch with the team at Ascentor.

Please use the contact details below - also found on our Contact Us page.

RECEIVE THE LATEST CYBER SECURITY NEWS AND CONTENT

Fields marked with an * are required
Share this:

You may also be interested in:

Building business resilience - through Information Security, Business Continuity and Disaster Recovery

How would you recover if something went drastically wrong with some, or all of your business operations? When we think of worst case scenarios,

Ascentor’s cyber security review of 2020

2020 wasn’t the first year where a virus emerged causing large scale disruption and opportunities for cybercrime. It was, however, the first time

Cyber security myths home workers fall for

From King Arthur to the moon landings that (allegedly) didn’t happen, it’s surprising what people want to believe without any real basis in fact.