Attacks/Breaches
2/20/2014
06:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

IT Pros Okay With Government's Role In Cybersecurity

Most U.S. IT pros see feds' involvement in security a positive, new Dell survey shows

So much for the Snowden effect: nearly 80 percent of U.S. IT leaders say the federal government plays a key and positive role in protecting enterprises from internal and external cyberthreats, a new survey commissioned by Dell Software found.

"How people think about government is particularly interesting, [as] 78 percent [in the U.S.] say it's helping," says Bill Evans, senior director of product marketing for Dell. The survey of 1,440 IT decision-makers worldwide in organizations with more than 500 users was conducted between October and November of last year.

"I don't know if people are believing there is a business value in compliance and government mandates or if frameworks are of value. This is one of the areas I'd like to delve deeper into," Evans says. But it seems to bode well for the new NIST Cyber Security Framework, he says.

Close to 90 percent of all respondents worldwide say government should help determine security defense strategies of organizations.

Meanwhile, three-fourths of organizations say they have been hit by a security breach within the past 12 months, while more than 80 percent say their current security processes let them identify a breach, but actual detection takes an average of seven hours.

But interestingly, just 18 percent of IT pros say the detection and prediction of unknown threats is a top concern. "What we took from that is that security pros are focused on things they know have to be focused on," Evans says. "They're trying to do a good job, spending more money, but becoming less secure ... They don't have time to focus on unknown threats."

Even so, they could solve some of those "unknown" threats with existing technologies, he says, such as identity management, encryption, and next-generation firewalls, Evan says.

Around 64 percent of all IT pros say their organizations must reorganize or restructure their IT processes to keep pace with new security threats; some 85 percent of U.S. IT pros believe this.

Nearly 70 percent are spending more money on user education and training for security in the past year, and about half say user education is a priority. More than half of the organizations worldwide have increased funding for monitoring services, and 72 percent of U.S. organizations have done so.

Mobile devices are dogging IT pros. While 93 percent allow personal devices to be used on the job, 57 percent say mobile security is a top concern in the next five years, and nearly one-fourth say the misuse or vulnerabilities of those devices are the root cause of breaches.

The full report by Dell is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-0914
Published: 2014-07-30
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...

CVE-2014-0915
Published: 2014-07-30
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 7.1.1.2, and 7.5 through 7.5.0.6; Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...

CVE-2014-0947
Published: 2014-07-30
Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.

CVE-2014-0948
Published: 2014-07-30
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.

Best of the Web
Dark Reading Radio