Published/updated: February 2007
While the spotlight of media attention often falls on external threats such as hackers, viruses, spyware and so on, it is well recognised in organisations that problems are far more likely to be caused by people working “on the inside,” potentially through malice but more likely due to foolishness or inadvertent error. Such risks need to be treated through a combination of technology deployment and policy implementation: while organisations are waking up to this, there is still some way to go to overcome past indifference and inactivity when presented with internal threats.
It is well understood that the internal threat is as prominent as the external one
According to 715 senior IT managers participating in a recent study conducted across Europe and the Middle East, security breaches or exposures from employees acting carelessly or deliberately are as much of a concern as external attack from hacking, viruses, spyware and so on. Around 80% of organisations rate the prominence of the threat in this area as significant. Furthermore, around 40% expect the challenges to persist, with a similar number expecting it to rise.
Distribution and fragmentation of data and systems create particular challenges
Almost three quarters of organisations point to the proliferation of confidential information across systems and locations as representing a particular challenge. Distribution and in many cases replication of data across different applications, desktops, servers and locations creates more opportunities for mistakes to occur and for information to end up falling into the wrong hands.
The trend towards mobile working is creating yet more challenges
Over half of organisations now regard the mobile working related security risks as significant and rising at the same level as employee related risks in general. Of particular concern is the increasing degree to which sensitive information is stored on mobile equipment and taken outside of the organisation in an unprotected manner. As part of this almost 70% of organisations highlight the potential threat to information security from USB memory sticks and other portable storage devices.
Some important specific solutions are on the investment agenda
While 30% of organisations have advanced authentication and single sign-on solutions in place, only 16% say identity and access management is fully taken care of. Most of the rest (over 50% in each case) are looking to either extend their investment in such management and automation solutions or invest for the first time.
But technology must be blended with the right policy and process
While organisations are already looking at technology to help manage access to systems and information in a more coordinated and efficient manner, the research suggests that appropriate solutions will only be effective if implemented within the right operational framework. While 62%, for example, say security infrastructure limitations have stood in the way of them evolving their working practices, 68% point to policy and process related challenges as an inhibitor to progress. This includes user training which is critical to protecting against the employee related risk.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
firstname.lastname@example.org or call +44 (0)1425 626501 / 620008
By Dale Vile
By Dale Vile
Creating a more customer centric business environment has historically been hard to achieve. In this paper, we will examine how technology and market trends, together with changes in the regulatory landscape, are elevating the status of customer centricity from ‘aspirational ideal’ to ‘business critical imperative’. ...more
By Dale Vile, Tony Lock, Jack Vile
With the phenomenal rise in the adoption of smartphones, tablets and other desirable devices, many pundits predict that the direction of corporate IT will increasingly be defined by end users. But does this make sense? ...more
By Dale Vile & Tony Lock
If it has been a while since you thought about your DR measures, or a review has been prompted by a risk assessment, compliance audit, actual disaster or some other scare, it’s worth taking some time to understand what can be achieved in light of important changes that have taken place over the past few years. ...more
By Tony Lock
With the advent of digitisation, all public sector environments generate and capture a significant amount of electronic data. Against this background, this paper explores how to manage costs and risks while meeting these changing needs through ‘active archiving’. ...more
By Dale Vile
In some organisations, the tension between IT and business teams has come to a head around the topic of devices & the so called ‘Bring Your Own Device’ phenomenon.It’s time for IT and business managers to get together & start a proper dialogue about how to deal with evolving requirements. ...more
By Dale Vile