The average employee attempts to access blocked social media sites six times every day, according to a new report. While many of those attempts are unintentional, they still represent potential security risks for CIOs and their IT departments. Credit: Thinkstock CIOs and IT managers are in many ways fighting a losing battle when it comes to blocking employee access to social media services and other websites on corporate networks. Every day, employee make an average of 6.2 attempts to access blocked social networking sites, such as Facebook and Twitter, according to a new report from Allot Communications, an Israeli enterprise IP service provider. Whether those attempts are intentional or the result of links in messages, redirects from other sites or ads, IT is responsible for the integrity of its systems. The vast majority of the failed attempts to access blocked sites were directed to Facebook, which represented 54 percent of all blocked social media traffic. Twitter represented 25 percent of blocked traffic during a six-month period that ended in April 2015, followed by Google with 8 percent and Pinterest at 3 percent, according to the research. For the study, Allot collected data from two of its customers with more than 10,000 employees each, and two service provider customers that sell security services to more than 100 small- to medium-sized business. [Related How-to: How to use Google’s new privacy and security tools] The nearly 100,000 employees surveyed for the report also made an average of 5.5 attempts to access blocked email and IM sites per day. Allot found that those companies blocked IM traffic 10 times more frequently than overall Web traffic because it often contains more malicious content. “These findings show CIOs that the various applications used by corporate employees are a backdoor to major security threats, aside from potentially reducing business productivity,” says Yaniv Sulkes, assistant vice president of marketing at Allot. CIOs and IT managers should consider social media, IM, cloud storage and anonymizers when they establish corporate acceptable use policies (AUPs), according to Sulkes. [Related Feature: IT pros share tips for building strong peer networks] Allot’s research found that 92 percent of blocked Web traffic was related to AUP enforcement, not intrusion detection systems. However, even a well-established AUP isn’t enough to stop employees from attempting to access suspect sites. “Establishing the policy is not enough, it needs to be enforced and this requires solutions and technologies which provide application visibility and control,” says Sulkes. “CIOs should have visibility into applications used in the corporate environment and act on it to diminish potential online threats.” Related content brandpost It’s time to evolve beyond marketing to create meaningful metaverse moments Insights on the results of the Protiviti and Oxford University survey: Executive Outlook on the Metaverse, 2033 and Beyond By Kim Bozzella Jun 08, 2023 6 mins Digital Transformation feature 10 hottest IT jobs for salary growth in 2023 The demand for tech workers hasn’t slowed down, as rising salaries reveal the most sought-after tech professionals for 2023, according to data from Dice. By Sarah K. White Jun 08, 2023 8 mins Salaries IT Jobs Careers interview Oshkosh CIO Anu Khare on IT’s pursuit of value The specialty truck maker’s IT chief sees tech-enabled transformation being fueled by a relentless focus on strategic fit and customer value — and passionate business involvement. By Dan Roberts Jun 08, 2023 9 mins Automotive Industry Manufacturing Industry IT Strategy news analysis What LOB leaders really think about IT: IDC study Businesses leaders increasingly rely on digital innovation to meet their goals but are not always giving IT a say in key business decisions, a disconnect that could hinder innovation, a new IDC study has found. By Peter Sayer Jun 08, 2023 6 mins Business IT Alignment IT Strategy IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe