Published/updated: February 2007
While the spotlight of media attention often falls on external threats such as hackers, viruses, spyware and so on, it is well recognised in organisations that problems are far more likely to be caused by people working “on the inside,” potentially through malice but more likely due to foolishness or inadvertent error. Such risks need to be treated through a combination of technology deployment and policy implementation: while organisations are waking up to this, there is still some way to go to overcome past indifference and inactivity when presented with internal threats.
It is well understood that the internal threat is as prominent as the external one
According to 715 senior IT managers participating in a recent study conducted across Europe and the Middle East, security breaches or exposures from employees acting carelessly or deliberately are as much of a concern as external attack from hacking, viruses, spyware and so on. Around 80% of organisations rate the prominence of the threat in this area as significant. Furthermore, around 40% expect the challenges to persist, with a similar number expecting it to rise.
Distribution and fragmentation of data and systems create particular challenges
Almost three quarters of organisations point to the proliferation of confidential information across systems and locations as representing a particular challenge. Distribution and in many cases replication of data across different applications, desktops, servers and locations creates more opportunities for mistakes to occur and for information to end up falling into the wrong hands.
The trend towards mobile working is creating yet more challenges
Over half of organisations now regard the mobile working related security risks as significant and rising at the same level as employee related risks in general. Of particular concern is the increasing degree to which sensitive information is stored on mobile equipment and taken outside of the organisation in an unprotected manner. As part of this almost 70% of organisations highlight the potential threat to information security from USB memory sticks and other portable storage devices.
Some important specific solutions are on the investment agenda
While 30% of organisations have advanced authentication and single sign-on solutions in place, only 16% say identity and access management is fully taken care of. Most of the rest (over 50% in each case) are looking to either extend their investment in such management and automation solutions or invest for the first time.
But technology must be blended with the right policy and process
While organisations are already looking at technology to help manage access to systems and information in a more coordinated and efficient manner, the research suggests that appropriate solutions will only be effective if implemented within the right operational framework. While 62%, for example, say security infrastructure limitations have stood in the way of them evolving their working practices, 68% point to policy and process related challenges as an inhibitor to progress. This includes user training which is critical to protecting against the employee related risk.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
firstname.lastname@example.org or call +44 (0)1425 626501 / 620008
By Dale Vile
Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define the future of end user computing. Most organisations today, however, see a role for both company and employee owned equipment to meet the wide and varied range of needs ...more
By Dale Vile
Network traffic flows have become pretty complex in today’s distributed business environment, and not just for large corporates. This became clear during a recent research study in which 610 small/medium-sized businesses gave us feedback ...more
By Jack Vile & Dale Vile
As both company and personally owned mobile devices are increasingly used in business, understanding and dealing with the associated risks has become a significant concern for many. In this report we explore some of the trends in mobile technology adoption. ...more
By Dale Vile
In a recent online survey in which responses were gathered from almost three hundred IT and business professionals, we investigated the related set of challenges and risks arising from fragmented cloud adoption in the area of security ...more
By Dale Vile
Organisations are increasingly turning to multi-tiered shared storage environments to deal with growing data volumes, changing business requirements, and IT delivery models. Managing Quality of Service (QoS) at scale, however, requires a highly automated approach ...more
By Tony Lock
VMware Virtual Volumes (VVOLs) are due to be released in 2015 and have been designed to help streamline deployment, make ongoing administration of VMs more straightforward, and to allow each VM to be managed individually. ...more
By Dale Vile