In the Land of the Security Blind

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14
Previous Next

Click through for IT security survey results from Securosis.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance


When it comes to data security, most IT organizations don’t have a handle on how often and to what extent their data is compromised.

A recent survey of 1,176 IT professionals conducted by the market research firm Securosis on behalf of Imperva, a provider of a range of data security technologies, found that the vast majority did not know how many times they may have experienced a major attack either eternally or internally, nor did they know what type of data had been stolen.

According to Imperva CTO Amichai Schulman, most IT organizations are not very effective in assessing the scope of the damage incurred by a security breach even when they are aware of the breach. And as the number of these breaches increases along with attacks aimed at the application layer, too many IT organizations are still overly dependent on a single line of defense at the security perimeter.

This situation not only makes it hard to justify security budgets, it frequently means that IT organizations during tough times are making hard choices in how to apply those budgets. Although applications are increasingly the primary point of attack, fear and inertia result in most of the IT security budget being spent on defending the network perimeter.

The Securosis survey shows that most IT professionals believe that most of the security technology they acquire is effective to one degree or another. It also shows that USB media encryption and data loss prevention technologies are at the top of the IT shopping list. In addition, the survey finds that the most effective security controls are full-drive encryption, access management tools, e-mail filtering and data loss prevention systems on the network. Survey participants also identified e-mail filtering and USB media encryption as the top two least effective security controls.

In the meantime, Schulman notes that the people launching these attacks are becoming more sophisticated by the day thanks to the influx of funding from organized crime syndicates. The end result is that IT organizations are increasingly outgunned when it comes to security.

Therefore, the challenge going forward, says Schulman, is figuring out how to size the appropriate level of security to the value of the data threatened. Unfortunately, many IT organizations don’t have a handle on the value of any given piece of data because they tend to manage all data as if it were of equal value. And until that situation changes, it’s only a matter of time before something bad happens that the IT organization may or may not know anything about.

 

More Slideshows

FidelisSecurityVendorQs0x Nine Questions to Ask When Selecting a Security Vendor

You need it. They claim to have it. What questions should you be asking as you hunt for the "just right" vendor to help you defend against the most sophisticated and determined adversaries?  ...  More >>

LogRhythmHeartbleed0x Heartbleed: Eight Tips and Strategies for Keeping Safe

One of the most dangerous IT security threats of all time emerged recently -- a bug called Heartbleed. Here are eight tips for keeping your data safe. ...  More >>

Security27-290x195 Seven Key Components to Start Your Incident Response Plan

Regardless of the size of an enterprise or its industry, organizations must create and implement an incident response program to effectively and confidently respond to current and emerging cyber threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.