Attacks/Breaches
2/20/2014
06:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

IT Pros Okay With Government's Role In Cybersecurity

Most U.S. IT pros see feds' involvement in security a positive, new Dell survey shows

So much for the Snowden effect: nearly 80 percent of U.S. IT leaders say the federal government plays a key and positive role in protecting enterprises from internal and external cyberthreats, a new survey commissioned by Dell Software found.

"How people think about government is particularly interesting, [as] 78 percent [in the U.S.] say it's helping," says Bill Evans, senior director of product marketing for Dell. The survey of 1,440 IT decision-makers worldwide in organizations with more than 500 users was conducted between October and November of last year.

"I don't know if people are believing there is a business value in compliance and government mandates or if frameworks are of value. This is one of the areas I'd like to delve deeper into," Evans says. But it seems to bode well for the new NIST Cyber Security Framework, he says.

Close to 90 percent of all respondents worldwide say government should help determine security defense strategies of organizations.

Meanwhile, three-fourths of organizations say they have been hit by a security breach within the past 12 months, while more than 80 percent say their current security processes let them identify a breach, but actual detection takes an average of seven hours.

But interestingly, just 18 percent of IT pros say the detection and prediction of unknown threats is a top concern. "What we took from that is that security pros are focused on things they know have to be focused on," Evans says. "They're trying to do a good job, spending more money, but becoming less secure ... They don't have time to focus on unknown threats."

Even so, they could solve some of those "unknown" threats with existing technologies, he says, such as identity management, encryption, and next-generation firewalls, Evan says.

Around 64 percent of all IT pros say their organizations must reorganize or restructure their IT processes to keep pace with new security threats; some 85 percent of U.S. IT pros believe this.

Nearly 70 percent are spending more money on user education and training for security in the past year, and about half say user education is a priority. More than half of the organizations worldwide have increased funding for monitoring services, and 72 percent of U.S. organizations have done so.

Mobile devices are dogging IT pros. While 93 percent allow personal devices to be used on the job, 57 percent say mobile security is a top concern in the next five years, and nearly one-fourth say the misuse or vulnerabilities of those devices are the root cause of breaches.

The full report by Dell is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web