SilverSky Predicts IT Security Spending Trends for 2014

Sue Marquette Poremba
Slide Show

November Patch Tuesday Addresses IE But Leaves Out Microsoft Word

I mentioned in my previous post that this is the time of the year for predictions. The folks at SilverSky have a slightly different twist. As a follow up to its 2013 Financial Institution Threat Report, the company decided to find out what 2014’s security spending trends will be. Understanding how to plan for security spending makes a lot of sense to me. As the SilverSky blog pointed out:

The best way to improve your organization’s security posture in 2014 is to more accurately understand today’s threat landscape into which you're pouring your budget.

So where is security spending happening? It appears that most companies will stick with what they know–firewalls, AV software, etc.–rather than look for new solutions. While protecting the network has to be the top priority in  IT security efforts, the survey found that what concerns IT departments the most is data loss and targeted phishing attacks. Because data loss can happen in ways that don’t involve breaching the network (e.g. lost devices or employee mistakes), it may be that focusing on the old-guard security approaches should be re-evaluated. Because, according to SilverSky:


Interestingly, only 37 percent of organizations plan to up their budgets on email security tools that directly address these concerns, highlighting a slight disconnect between spending plans and perceived threats.

These security decision makers are on the right track, and a quarter of them plan to increase their security investments next year–but wouldn’t the money be spent more wisely and security itself improved if IT security departments were able to focus spending on the areas that worry them most?

I wonder how much money is being budgeted to expand BYOD security education and policy. Or how much will be spent for just improving security education in general? In the end, your security spending has to match your needs plus maybe a little bit more in anticipation of what could happen. We know that as soon as we plan for one thing, in the worlds of technology and security, someone is there to find a new way to infiltrate the network.



Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data