Is the push for productivity creating a pathway for cyberattacks?

Representational image depecting cybersecurity protection
(Image credit: Shutterstock)

It’s no secret that organisations are under increased pressure to improve efficiency. With close to zero productivity growth in the UK between 2007 and 2017, the pressure is on. 

We’re seeing organisations rightfully embrace all manner of new technologies resulting from digital transformation to maximise efficiencies, from cloud-based collaboration platforms to artificially intelligent software bots. 

However, SailPoint’s Market Pulse Survey found that these new technologies are also introducing risk to the workplace, as are office workers’ poor cybersecurity habits. As employees prioritise efficiency ahead of cybersecurity – also putting them at odds with IT – it is their organisations that truly suffer as a result of this undue risk. 

In their efforts to achieve workplace efficiency, employees are engaging in risky behaviour like deploying software without IT’s approval – a practice commonly known as shadow IT. 

In fact, our survey found that nearly one in three employees admitted to using shadow IT, which introduces new technologies into the workplace outside of IT’s visibility. 

This lack of visibility leaves IT teams unable to effectively govern and secure their organisation’s users and their access to sensitive applications and data. After all, how can the IT team secure what they cannot see?

This focus on efficiency over security by the workforce has not only introduced more risk to the workplace but also created a sense of frustration between workers and their IT teams. 

A full 55 per cent of employees surveyed said that their IT department can be a source of inconvenience – a perception that understandably leads to friction between the two parties. IT teams are also often being left out of cybersecurity conversations until something goes wrong. 

Our survey shows that 49 per cent of employees admit they would blame IT for a cyberattack if one occurred as a result of an employee being hacked.  

It is clear that workers are not taking their role in cybersecurity – or IT’s recommendations – seriously. And with younger generations entering the workforce, the future does not look bright. 

Despite their technological prowess, the 18-25 age group fall short compared to other employees when it comes to cybersecurity, with 87 per cent reusing passwords across different accounts. Amongst this group, almost half (47 per cent) duplicate passwords across work and personal accounts. 

Perhaps most alarmingly, 28 per cent of 18 to 25 year olds would even consider selling their workplace passwords to a third party. 

As the digital transformation continues to introduce rapid changes in the workplace, the best way to increase efficiency without sacrificing security in the process is to secure an organisation’s users, which are the common link across the IT ecosystem and the new security perimeter. 

By taking this identity-centric approach to security, organisations will have the much-needed visibility across all of their users, applications and data. A comprehensive identity governance strategy can also alleviate the stress between the IT and business departments by giving employees appropriate access to the applications and data they need to securely do their jobs. 

With identity governance, organisations can embrace the new technologies that come with the digital transformation, enabling their workforces while also providing IT the visibility and security they need in their increasingly complex IT environments. Otherwise, organisations risk being exposed by the very technologies that are designed to improve their productivity. 

 Juliette Rizkallah is CMO at SailPoint 

Juliette Rizkallah

Juliette Rizkallah is the Chief Marketing Officer at SailPoint Technologies. She is a marketing executive with 20+ years experience in IT industry, specifically Security and Big Data. Her Specialties include storytelling, positioning and category definition, branding and voice amplification, world-class demand generation and building best-in-class marketing organizations.

Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring