Published/updated: September 2008
by Jon Collins
Much has been written about the existence of various threats, internal and external, and vendors are only too quick to proffer solutions to the problems. But what really needs to exist for security to work? This report considers some of the more behavioural aspects of security best practice, such as the role of awareness, policy and communications.
IT security matters - but some organisations are doing better than others
While IT security is generally seen as important to our IT-oriented research sample, there is a general feeling that such aspects as the level of security awareness, and how seriously IT security is taken by business management, could be better. Such characteristics can be used to determine organisations that generally are ahead of the pack, and those who are lagging behind.
Leading organisations believe themselves to be better protected, and rightly so
In general, organisations that we have categorised as ’leaders’ believe themselves to be better protected than the ’laggards’. It is not always as simple as this when it comes to a reduction in threat levels, as it will tend to be those threats that are directly influenced by good security practices, that show the most marked improvements.
Having a comprehensive security policy is fundamental to good security practice
Organisations with a fully comprehensive, dynamic security policy are less likely to suffer security breaches such as web site defacement, or indeed theft. It is therefore no surprise to note that the more leading organisations are twice as likely to have such a policy in place than the sample as a whole. Equally notable is that organisations with outdated policies fare less well than those with no policy in place at all.
Communication between the business and IT is also important
Few would doubt that business risks should be prioritised as an input to implementing good security practice. There is a big difference of opinion between the leaders and the laggards however, concerning how important it is to communicate this information both to IT, and to the workforce. And indeed, such co-ordination has a tangible impact on risk reduction.
More progressive IT security organisations are deploying more complex tooling
IT security tools are in general bought more on the basis of simplicity than need - tools that are easy to cost-justify and deploy are far more likely to be in place than more complex tools. However, leading edge organisations are installing the more challenging tools. The lesson is not to install everything, but to review one’s own situation and make the necessary improvements that become apparent.
The research upon which this report is based was designed and interpreted on an independent basis by Freeform Dynamics. Feedback was gathered from 1,102 IT and business professionals during the online study, which was conducted in partnership with The Register.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
firstname.lastname@example.org or call +44 (0)1425 626501 / 620008
By Dale Vile
Network traffic flows have become pretty complex in today’s distributed business environment, and not just for large corporates. This became clear during a recent research study in which 610 small/medium-sized businesses gave us feedback ...more
By Jack Vile & Dale Vile
As both company and personally owned mobile devices are increasingly used in business, understanding and dealing with the associated risks has become a significant concern for many. In this report we explore some of the trends in mobile technology adoption. ...more
By Dale Vile
In a recent online survey in which responses were gathered from almost three hundred IT and business professionals, we investigated the related set of challenges and risks arising from fragmented cloud adoption in the area of security ...more
By Dale Vile
Organisations are increasingly turning to multi-tiered shared storage environments to deal with growing data volumes, changing business requirements, and IT delivery models. Managing Quality of Service (QoS) at scale, however, requires a highly automated approach ...more
By Tony Lock
VMware Virtual Volumes (VVOLs) are due to be released in 2015 and have been designed to help streamline deployment, make ongoing administration of VMs more straightforward, and to allow each VM to be managed individually. ...more
By Dale Vile
By Dale Vile
Creating a more customer centric business environment has historically been hard to achieve. In this paper, we will examine how technology and market trends, together with changes in the regulatory landscape, are elevating the status of customer centricity from ‘aspirational ideal’ to ‘business critical imperative’. ...more