In the Land of the Security Blind

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14
Previous Next

Click through for IT security survey results from Securosis.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance


When it comes to data security, most IT organizations don’t have a handle on how often and to what extent their data is compromised.

A recent survey of 1,176 IT professionals conducted by the market research firm Securosis on behalf of Imperva, a provider of a range of data security technologies, found that the vast majority did not know how many times they may have experienced a major attack either eternally or internally, nor did they know what type of data had been stolen.

According to Imperva CTO Amichai Schulman, most IT organizations are not very effective in assessing the scope of the damage incurred by a security breach even when they are aware of the breach. And as the number of these breaches increases along with attacks aimed at the application layer, too many IT organizations are still overly dependent on a single line of defense at the security perimeter.

This situation not only makes it hard to justify security budgets, it frequently means that IT organizations during tough times are making hard choices in how to apply those budgets. Although applications are increasingly the primary point of attack, fear and inertia result in most of the IT security budget being spent on defending the network perimeter.

The Securosis survey shows that most IT professionals believe that most of the security technology they acquire is effective to one degree or another. It also shows that USB media encryption and data loss prevention technologies are at the top of the IT shopping list. In addition, the survey finds that the most effective security controls are full-drive encryption, access management tools, e-mail filtering and data loss prevention systems on the network. Survey participants also identified e-mail filtering and USB media encryption as the top two least effective security controls.

In the meantime, Schulman notes that the people launching these attacks are becoming more sophisticated by the day thanks to the influx of funding from organized crime syndicates. The end result is that IT organizations are increasingly outgunned when it comes to security.

Therefore, the challenge going forward, says Schulman, is figuring out how to size the appropriate level of security to the value of the data threatened. Unfortunately, many IT organizations don’t have a handle on the value of any given piece of data because they tend to manage all data as if it were of equal value. And until that situation changes, it’s only a matter of time before something bad happens that the IT organization may or may not know anything about.

 

More Slideshows

SurfWatchCyberCrimeTrends0x Trends in Cyber Crime: A Look at the First Half of 2014

A new report aggregates and standardizes cyber crime data from the first six months of the year into cyber BI that provides some interesting insights. ...  More >>

Misc40-290x195 Ten Vulnerabilities that Impact Enterprise Cloud Apps

With increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network. ...  More >>

Security45-290x195 Cyber Crime: Law Enforcement Fights Back

While cyber crime continued to dominate headlines and wreak havoc on organizations of all sizes across nearly every industry in the first half of 2014, it's refreshing to note law enforcement also stepped it up. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.