Analytics
1/13/2014
02:03 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Employees Revealed As Greatest Challenge To IT Security, Says SecureData

While 40 percent of respondents viewed operations teams as the greatest risk to security, finance teams were also seen as a significant worry

10 January 2014, Maidstone, Kent: SecureData, the complete security service provider, today revealed that 60% of IT professionals view employee carelessness as the biggest risk to an organisation's security, well above the usual suspects like data theft (13%), external malware (10%) or technology failure (7%).

The findings are based on responses from 110 IT professionals, half of whom are in major organisations with over 5,000 employees. While 40% of respondents viewed Operations teams as the greatest risk to security, Finance teams were also seen as a significant worry (13%). Interestingly, at a time when cloud security is being hotly debated, no one cited this as a primary security concern.

While IT professionals have been quick to spot the risks posed by non security conscious employees, agreement on how to tackle the challenge is less certain. 40% of respondents felt that educating employees was the most important step to improving security, but 25% added that implementing a clear security management policy was their weakest area. Meanwhile, almost half (44%) of those questioned said that the ultimate responsibility for security decision-making is left in the hands of more junior IT managers, rather than C-level staff (44%) or department heads (12%).

Commenting on the findings, SecureData's CEO Etienne Greeff said: "There's a huge opportunity here for organisations to tighten security simply by better educating their staff. Don't leap to technical answers and complex solutions. This is not about budget-busting new technologies, but going back to basics: plan and deliver a simple, straightforward security policy that employees can easily follow."

50% of respondents see a holistic approach to security as crucial to meeting the security challenge, with 36% stating that detecting threats quickly is the weakest area of their current approach.

Greeff concludes: "It's encouraging to see so many recognising the importance of a holistic approach to security. Assessing risk, detecting threats earlier, protecting valuable assets and responding quickly when there is a breach will help restore trust in colleagues across an organisation. But this leadership must come from the top, with the C-level stepping up to tackle the security knowledge gap in their organisations."

-ENDS-

About SecureData

SecureData is a complete security service provider with a proactive approach. We minimise business disruption for our clients and offer the complete security spectrum from assessing risk to detecting threats, protecting valuable assets and responding to breaches when the happen.

We specialise in providing managed services that help businesses secure their data and networks, fight an increasing array of cyber threats, optimise networks to improve employee mobility, ensure regulatory compliance and allow the safe adoption of both cloud computing and consumer technologies in the workplace.

Operating from its UK based Security Operations Centre; the company offers manned support on a 24 x 7 x 365 basis, with its own unique real-time monitoring service developed in-house and tailored to suit both small businesses and large corporate enterprises alike.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.