09:34 AM
Keith Ferrell
Keith Ferrell

Survey: 40 Percent Of You Still Think Your Networks Are Insecure (And You're Probably Right)

And most of the rest of you continue to leave endpoints unguarded, according to a new survey of small and midsize businesses.

And most of the rest of you continue to leave endpoints unguarded, according to a new survey of small and midsize businesses.The survey from networking software developer GFI polled 455 IT execs from small and midsize businesses.

Among the most notable -- though least surprising -- findings was that while 42 percent of the respondents worried that their networks remained vulnerable, well over 90 percent had anti-virus software and firewalls deployed. 80 percent are using spam filters, though less than 20 percent had endpoint security solutions in-place.

That last is in line with the even small number -- 7 percent -- of you who are concerned about insider threats, and the threats posed by portable storage devices.

Which leads to the conclusion that the 42 percent insecurity finding -- as GFI points out -- may have less to do with the actual security of the networks than the growing perception that no amount of protection can actually deliver unbreachable security.

True enough -- as true in the digital age as it's been in every other age: there is no real security this side of the grave, the old saying goes.

But it's also true enough that deploying some aspects of a broad and robust multi-faceted security strategy while leaving others essentially ignored is a formula for problems, possibly, um, grave ones.

No wonder more than half of the respondents wanted more employee education on security issues, and a quarter wished their management better understood the nature of the security challenge. Presumably a better educated management would be more willing to spend the money needed to address all of danger-points, not just the most obvious ones.

Take a look at the entire survey here.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
(ISC)2 Report: Glaring Disparity in Diversity for US Cybersecurity
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/15/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.