EiQ Networks conducted a survey on information security priorities and challenges. Based on responses from 168 IT decision makers across industries, results point to lack of confidence in their security technologies and lack of the people, processes to implement it.
Lack of process was a top concern with 62% of IT pros noting they have either "no process" or a "partial process" in place to detect and respond to a security incident. Moreover, only 15% of companies surveyed believe their employees are "well prepared" to spot the signs of an attack and react accordingly.
72% of respondents stated that their IT infrastructure is "not well protected" and is vulnerable to APTs. However, 52% of companies surveyed say they have made it a "priority" to re-think their infrastructure to keep pace with APTs.
The survey found that companies are using a variety of security technologies such as Traditional Firewall (86%); Anti-virus software (71%); IDS/IPS technologies (59%); Log management (58%); SIEM (44%).
Despite these technology deployments, only 27% of IT decision makers report they are truly "confident" that these technologies will work against a cyber-threat. 58% report they are "somewhat confident" in these technologies to effectively mitigate risk of security incidents and that they are still seeking alternatives.
Company and brand reputation more at risk than financials:68% of companies surveyed said their "reputation" is more at stake than their financials19% said they could withstand a "small financial hit" while 13% said a cyber-attack would "devastate us financially".Top areas of concern regarding IT security:Respondents indicated that Network perimeter (23%), Endpoints (21%) and Web applications (14%) were areas of highest concern.
Respondents ranked the following priority security initiatives:(1) Network monitoring, (2) Anti-virus software, (3) Data encryption, (4) An IT security professional, (5) Cyber insurance policy, (5) Provider of managed services."Companies today have serious gaps in their security program, specifically the people, process and technology they need to protect their valuable customer and corporate data, and intellectual property," said Vijay Basani, Chairman, President and CEO of EiQ Networks. "In today's heightened threat environment, companies need to adopt a multi-pronged comprehensive security program that addresses vulnerabilities related to people, process, technology and culture. We believe there is demonstrable benefit to implementing SANS Critical Security Controls that deliver pro-active and reactive security controls & continuous monitoring to identify, prevent and mitigate cyber-security risks."
Source:
Help Net Security
Help Net Security
Image Credit: cert.ug
3 comments:
I never thought I will come in contact with a real and potential hacker until I knew brillianthckers800 at Gmail and he delivered a professional job,he is intelligent and understanding to control jobs that comes his way
Contact him and be happy
Excellent and professional investigative services. I hired Mr RODNEY for a very private and difficult matter of hacking my husband's phone and he far exceeded my expectations. He helped me get some info such as whatsapp, facebook, text messages, call logs and even phone conversations that I needed for proof of his secretive affair. The first time we spoke, we had a very long phone consultation in which he gave me all my options that he could think of to resolve my case, and he even recommended I try other options before hiring him, which shows that he is honest. I decided to hire him and I am glad I did. He is a fantastic investigator and a great person; to all loyal partners out there if you have a dishonest partner don't hesitate to send him a mail Contact: ETHICALCYBERSPY217@GMAIL.COM...
I am Tess and I want to testify to Cybercryptogetback1 for getting back my funds from an online scam. I invested a total of $200k into a Trade platform so I was told and all. But in a few months after I could not get my both invested and profit back after it was a sum up. I just want to thank Sean of cybercryptogetback1 for helping me hack through and get back my finds. I was able to get it back within just a few weeks. Contact him via mail @ cybercryptogetback1(at)gmail(dot)com.
Post a Comment