This report examines the role of end-user applications within a corporate information systems environment. It focuses on the necessity of establishing and enforcing strict internet usage policies to mitigate data security risks stemming from employee actions, such as downloading applications from the internet or using external storage devices. The report emphasizes the importance of a clearly defined internet usage policy, which should be acknowledged by employees, covering rules for computer and internet usage. The policy aims to balance security with usability, and the report highlights the consequences of policy violations. References are provided to support the analysis of the impact of the internet of things self-security on daily business and business continuity, as well as the impact of information security policies, procedures, and standards.