Enterprises are watching employees and employees are watching employers with increasing unease on both sides. In our global economy with its fluid workforce, in which longstanding relationships of trust are difficult to establish and maintain, the temptation for businesses is clear: monitor every employee, all the time. Employees are feeding the distrust. Many enterprises live with the lost-time cost of widespread employee abuse of e-mail and Internet access. But it’s much worse than that. Gartner estimates that more than 70 percent of unauthorized access to information systems is committed by employees, as are more than 95 percent of intrusions that result in significant financial losses. Add to that the mind-boggling potential for carefully planned crimes of mass destruction and you can see the temptation to impose rigid security measures. “Seventy percent of unauthorized access to information systems is committed by employees.”How are enterprises reacting? Gartner estimates that average enterprise spending on security worldwide will increase by a factor of two to three within the next few years, and by a factor of 10 by the end of the decade. As usual where technology is concerned, most of that money will be spent on smart people, policies, processes, and procedures. The unfortunate result of “clamping down” is more friction, the drag that distrust puts on relationships. Power and control work from the top down; productivity and creativity work from the bottom up. As top-down control exerts itself to a greater extent, there is a rupture of trust and a corresponding decline in creativity and productivity. Having your emails read or being watched by security cameras tends to naturally deflate one’s sense of company loyalty. What top managers of enterprises need to find is a balance between security that can protect their businesses and free communication that can stimulate growth. Success depends on it. They need to think about that balance in terms of what Gartner research calls the “Resilient Virtual Organization” in which security is the ability to survive and prevail, not just hunker down and resist intrusion. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe