Click here to close now.




















Welcome!

Blog Feed Post

Employees revealed as greatest challenge to IT security, says SecureData

40% of IT professionals view Operations teams as the biggest risk to security, above malware and external threats

10 January 2014, Maidstone, Kent: SecureData, the complete security service provider, today revealed that 60% of IT professionals view employee carelessness as the biggest risk to an organisation's security, well above the usual suspects like data theft (13%), external malware (10%) or technology failure (7%).

The findings are based on responses from 110 IT professionals, half of whom are in major organisations with over 5,000 employees. While 40% of respondents viewed Operations teams as the greatest risk to security, Finance teams were also seen as a significant worry (13%). Interestingly, at a time when cloud security is being hotly debated, no one cited this as a primary security concern.

While IT professionals have been quick to spot the risks posed by non security conscious employees, agreement on how to tackle the challenge is less certain. 40% of respondents felt that educating employees was the most important step to improving security, but 25% added that implementing a clear security management policy was their weakest area. Meanwhile, almost half (44%) of those questioned said that the ultimate responsibility for security decision-making is left in the hands of more junior IT managers, rather than C-level staff (44%) or department heads (12%).

Commenting on the findings, SecureData's CEO Etienne Greeff said: "There's a huge opportunity here for organisations to tighten security simply by better educating their staff. Don't leap to technical answers and complex solutions. This is not about budget-busting new technologies, but going back to basics: plan and deliver a simple, straightforward security policy that employees can easily follow."

50% of respondents see a holistic approach to security as crucial to meeting the security challenge, with 36% stating that detecting threats quickly is the weakest area of their current approach.

Greeff concludes: "It's encouraging to see so many recognising the importance of a holistic approach to security. Assessing risk, detecting threats earlier, protecting valuable assets and responding quickly when there is a breach will help restore trust in colleagues across an organisation. But this leadership must come from the top, with the C-level stepping up to tackle the security knowledge gap in their organisations."

-ENDS-

About SecureData
SecureData is a complete security service provider with a proactive approach. We minimise business disruption for our clients and offer the complete security spectrum from assessing risk to detecting threats, protecting valuable assets and responding to breaches when the happen.

We specialise in providing managed services that help businesses secure their data and networks, fight an increasing array of cyber threats, optimise networks to improve employee mobility, ensure regulatory compliance and allow the safe adoption of both cloud computing and consumer technologies in the workplace.

Operating from its UK based Security Operations Centre; the company offers manned support on a 24 x 7 x 365 basis, with its own unique real-time monitoring service developed in-house and tailored to suit both small businesses and large corporate enterprises alike.

Notes to Editors
1. This research was conducted in November 2013 as a live poll at SecureData's Security Focuses 2013 event, questioning 110 IT professionals in enterprises of all sizes
2. For interview requests or to see the full report, please contact Olie Mitchell ([email protected] / 0203 542 6644).

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advance...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Learn what is going on, contribute to the discussions, and e...
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, will discuss how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a prac...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
Contrary to mainstream media attention, the multiple possibilities of how consumer IoT will transform our everyday lives aren’t the only angle of this headline-gaining trend. There’s a huge opportunity for “industrial IoT” and “Smart Cities” to impact the world in the same capacity – especially during critical situations. For example, a community water dam that needs to release water can leverage embedded critical communications logic to alert the appropriate individuals, on the right device, as...
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products. In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, will discuss how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the ...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing thes...