What IT security lessons can teenagers teach the enterprise?
Davey Winder looks a little closer to home to see how the enterprise can learn from his teenage son's approach to security...


I've been involved in IT security for twenty years now, and you'd think - as a result - my teenage son would be mindful of such matters. But you couldn't be more wrong.
My lad has absolutely no security smarts, despite my efforts, and his mistakes are all too often mirrored in the corporate world. The consequences, however, are a tad more serious than someone posting embarrassing messages on Facebook. Let me explain.
Data sharing is the main problem I have with my teen. He signs into his social media accounts on someone else's device, and forgets to logout when he passes it back.
He thinks nothing of leaving the family laptop running for 15 minutes or more while his social media accounts remaing logged in.
Unsurprisingly, this has resulted in his mates, his girlfriend and me posting stupid things under his name using his account. Worse still, he also uses the same password for his social media, laptop, and his Xbox account.
In this, he's not alone. New consumer-focused research from Kaspersky Lab suggests 32 per cent of people take absolutely no precautions when letting others use their devices and 92 per cent store sensitive information on them.
Those numbers also sound about right for the business sector. At the smaller end of the enterprise scale, device sharing is pretty common and adequate security measures are not. As you move up the curve towards larger enterprises, things improve as far as device security goes, but the sensitive data issue remains.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
It's all tied into the whole Bring Your Own Device (BYOD) problem, of course, and how to control what data is allowed where, who can access it and when.
Although the BYOD has been done to death, there remains a problem whereby shadow IT exists within the enterprise and a data-centric approach to security is not in place to help mitigate the threat.
How does this tie into my teenage son's device misuse? Well, unless you get to grips with securing data itself, then users of devices will remain the weak link in your strategic security chain.
You cannot control who uses a personal device once it is out of the workplace, and you cannot control what users do with it.
If you don't get serious about data security, rather than device security, you are heading for a fall. My son, on the other hand, is a lost cause. Luckily, he has no data of any value whatsoever. I know, I've seen his Facebook feed.
Davey is a three-decade veteran technology journalist specialising in cybersecurity and privacy matters and has been a Contributing Editor at PC Pro magazine since the first issue was published in 1994. He's also a Senior Contributor at Forbes, and co-founder of the Forbes Straight Talking Cyber video project that won the ‘Most Educational Content’ category at the 2021 European Cybersecurity Blogger Awards.
Davey has also picked up many other awards over the years, including the Security Serious ‘Cyber Writer of the Year’ title in 2020. As well as being the only three-time winner of the BT Security Journalist of the Year award (2006, 2008, 2010) Davey was also named BT Technology Journalist of the Year in 1996 for a forward-looking feature in PC Pro Magazine called ‘Threats to the Internet.’ In 2011 he was honoured with the Enigma Award for a lifetime contribution to IT security journalism which, thankfully, didn’t end his ongoing contributions - or his life for that matter.
You can follow Davey on Twitter @happygeek, or email him at davey@happygeek.com.
-
Cisco names Oliver Tuszik as global sales chief
News Cisco has announced the appointment of Oliver Tuszik as its new executive vice president of global sales, who replaces Gary Steele.
By Daniel Todd
-
AI will chew through the same amount of energy as Japan by 2030
News The energy demand of AI data centers will top that of Japan by the end of the decade, new research shows – and that’s providing that energy grids can even keep up.
By Nicole Kobie
-
Strengthening your data resilience strategy
webinar Safeguard your digital assets
By ITPro
-
Analyzing the economic benefits of Trend Micro Vision One
Whitepaper Trend Micro Vision One as a solution to cyber risks
By ITPro
-
Oracle to build sovereign cloud regions in the EU for 2023
News The cloud giant will launch the first two regions in Germany and Spain
By Zach Marzouk
-
EU votes to implement Digital Markets Act
News New DMA legislation aims to prevent big tech companies from giving preferential treatment to their own products and services
By Daniel Todd
-
KRI basics for IT governance
Whitepaper How information technology & information security can implement this crucial part of risk management
By ITPro
-
Optimising storage infrastructure for DevOps practices
Whitepaper Maintaining IT infrastructure to best support application services
By ITPro
-
Rebooting your BYOD strategy
In-depth With hybrid working becoming the norm, there's a need for a device management overhaul. What does BYOD 2.0 look like?
By Kate O'Flaherty
-
Google accused of 'deceptive' location tracking in fresh US lawsuit
News The tech giant said the case is based on inaccurate claims and outdated assertions about its settings
By Zach Marzouk