My security analyst is recommending we shut off access to third-party personal email accounts to reduce the risk of attack as a result of phishing attempts through these platforms.  Is this something many companies do?

4.9k views9 Comments
Sort By:
Oldest
Senior VP & CISOa year ago
yes - no personal email (ex. gmail), collaboration sites (google doc, for instance), and social media except where we have a presence (LI, Twitter...), 
1
CISO in Softwarea year ago
I am not aware of any major public enterprises that restrict employee use of personal email, etc. in the work environment. The only exception is in government or restricted classified environments, etc.
2
Director of Network Transformationa year ago
Maybe in the government or high security role within a company but in our networked economy, not recommended.  
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Director in Manufacturinga year ago
We did shut it off decades ago With 130k employees and a lot of contractors it was a frequent source of problems. Less problems is always better and there was no business justification to allow access to those personal emails. People could access them from their personal phones

And in general we did not do BYOD on PCs or phones
1
CIO in Healthcare and Biotecha year ago
We haven't done it, nor are there any plans to do so. My experience is that locking people down leads to more "workarounds" and efforts to subvert what you're trying to accomplish. It also creates a cultural message that you may not want. In high-security or government functions I can see it, but I would be opposed to it. Rather, I would focus on training, protection tools, etc. 
1

Content you might like

Head of Enterprise Architecture MERCK Group in Healthcare and Biotecha year ago
Strategy & Architecture
Read More Comments
39k views5 Upvotes34 Comments

TCO19%

Pricing26%

Integrations21%

Alignment with Cloud Provider7%

Security10%

Alignment with Existing IT Skills4%

Product / Feature Set7%

Vendor Relationship / Reputation

Other (comment)

View Results
5.7k views3 Upvotes1 Comment
CISO/CPO & Adjunct Law Professor in Finance (non-banking)a month ago
I don’t have an answer, but I have a question that may be helpful.  Do you have a business/product roadmap for the target timeframe?

The technology plan and associated cybersecurity program should support  business ...read more
413 views1 Comment

Human Factors (fears, mental health, physical spacing)85%

Technical / IT Factors (on-premise tools, pivoting back away from remote)14%

3.7k views3 Upvotes2 Comments