Does your generation pose an office security risk?

The Baby Boomers, Generation X and Generation Y each have their own bad habits.

Whether you were born in the swinging sixties or are part of the slacker generation, some security experts say generational social influences can give you bad habits and make you an office liability.

The workplace is now comprised largely of three distinct generations; The Baby Boomers, Generation X and Generation Y - also known as Millennials or the Echo Boom. CSOonline looked at three areas of security that experts are concerned about when it comes to employee behavior. Read on to find out why your generation might be engaging in some risky conduct that could set your company up for a security breach.

Generation Y, or Millennials

Generation Y is the youngest generation of today's workers. If you were born after 1980, your probably grew up with play dates, lots of supervision from parents and the Internet. 9/11 was a defining moment in your lives, and it influences your perception of security.

IT security: When it comes to IT security, this is where your boss might have cause to be concerned about you. You IM with friends, log onto Facebook and download iTunes - all during office hours on the company's computer. "For Millennials, there is more blurring of the lines between work and home," said Samir Kapuria, a managing director with Symantec Advisory Consulting Services. In fact, a recent Symantec survey found 66 per cent of Millennials said they use Web 2.0 technologies, such as Facebook and YouTube, while at work. The problem? These kinds of Web 2.0 technologies are a huge target for phishing scams or malicious code attacks. That puts your company's precious data at risk.

Physical Security: Want to avoid uncomfortable confrontations in the workplace? Respect your elders. That's the advice of Roberta Chinsky Matuson, president of Human Resource Solutions, a US-based consultancy that regularly advises corporations on generational differences. Millennials are showing up with a completely different style of collaborating and listening and that frustrates older workers, she said. Texting in a meeting and answering your cell phone while talking to your boss isn't usually appropriate. Keeping this in mind can help diffuse a potentially explosive situation, said Matuson.

ID and Access: Millennials are also known for having being impatient and having a short attention span, according to Jack Dowling, the president of JD security Consultants. That can cause problem when its time to implement a new system for building access and security. Waiting in line can sometimes be an issue in a security system, depending on how entry control works. Impatient users may view this as a waste of time and try to gain access through an exit door and bypass the security protocol for entry, said. Dowling The good news is Millennials are often eager to please. Your motivation to receive positive feedback and praise means you are likely to comply with a system, as long as you know the rules.

Generation X

Generation X, at one point known as the slacker generation, is the group born between 1965 and 1982. Gen X is the MTV generation; kids who came of age during the Reagan-era and the Cold War. If you are a Gen Xer, when asked about the death of Kennedy, you're more likely to remember that fateful plane crash involving JFK Jr. instead of his Dad.

IT security: Gen Xers tend to be comfortable with technology and know how to use it properly. Technology has been part of your life all along and many Xers were part of the first tech companies that revolutionized the industry. Gen X was also on the job when the dot-com bubble burst. "Gen Xers were the original latch-key kids," said Matuson. Consequently, the independence this generation experienced as kids has led them to be adaptable. Unlike their younger Millennial counter parts, Gen Xers tend to keep work and home life separate and may be less likely to use corporate computers for personal use.

Join the CSO newsletter!

Error: Please check your email address.

More about BossFacebookGeneration XScience Applications InternationalSecurity SystemsSymantec

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Joan Goodchild

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place