Harsh Security Standards May Lead to More Security Breaches

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Harsh Security Standards May Lead to More Security Breaches-3 Next

As a result of the numerous cyber threats, cyber security professionals are focused on keeping data secure but fail to prioritize the user experience. Seventy-four percent of cyber security professionals say their top priority is preventing data theft, followed by ensuring a thorough Web security strategy (56 percent), maintaining and upgrading security systems (55 percent), deploying the most up-to-date cyber security protocols (54 percent), and mitigating denial-of-service attacks (53 percent). Ensuring a user-friendly experience across all security applications comes in last on cyber security professionals’ list of priorities, with only 40 percent reporting it as a top concern.

MeriTalk, a public-private partnership focused on improving the outcomes of government IT, recently announced the results of its new report, “Cybersecurity Experience: Cybersecurity Pros from Mars; Users from Mercury.” The study, underwritten by Akamai Technologies, Inc., compares what cyber security professionals report about their agency’s security with what end users – federal workers – actually experience. According to the report, agencies often fail to take the user experience into account when deploying cyber security solutions. As a direct result, end users often circumvent security measures and open their agencies up to data theft, data loss and denial-of-service attacks.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.