Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Enterprises Struggle to Identify Sources of Risk

Security remains top priority, but businesses wrestle with business case, BT study says

Enterprises are putting a good deal of emphasis on risk management these days, but they don't all agree on how to measure risk, according to a new industry study.

The annual security study, which will be published Friday by service provider BT, offers a look at enterprise security priorities and perceived threats. The upshot: Although managing risk has become an important thread in IT security, making a business case for security technology is still a challenge.

In the survey, 83 percent of enterprises placed "improving security" among their top priorities for the next 12 months. Twenty-two percent said it is their first priority. More than a third of respondents plan to implement risk management tools across all of their business units in the next 12 months; another 26 percent will implement such tools with some business units.

But identifying the source of the risk -- and making a business case for investing in the technology required to reduce it -- remain elusive targets for many enterprises, the study says.

For one thing, the fear of internal attacks seems to have diminished over the past two years. In 2006, about 40 percent of respondents said internal attacks were their top concern; that figure has dropped to 33 percent. In 2006, some 37 percent of executives felt that internal attacks were the most potentially damaging or costly; that figure has dropped to 35 percent.

"It seems that the pendulum, which had swung toward internal concerns, is now swinging the other way," says Dustin Owens, one of the leaders of the security research project.

At the same time, however, executives who responded to the survey indicated that end users remain the weakest link in the security chain. Thirty percent of respondents indicated that "inadequately trained/unconcerned users" are their biggest concern when evaluating potential security breaches.

"Given all the attention that's been paid to user awareness in the past few years, it's sort of surprising that the user issue continues to be such a big part of the problem," says Rick Blum, director of strategic marketing at BT. "It's proof that security awareness training can only get you so far."

And despite heavy emphasis on security issues, many organizations still don't review their environments for potential vulnerabilities as often as they should, according to the study. Only about 48 percent of enterprises said they evaluate their security postures as often as four times a year.

Part of the problem is that security pros need to do a better job of making a business case, the study says. "This will require quantifying the potential cost of data loss as well as downtime caused by a virus or other attack," the report states. "These costs should take into account financial damages (outright theft), recovery costs (notification of affected parties, etc.), and loss of reputation (leading to loss of business)."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • BT Global Services

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/6/2020
    Ripple20 Threatens Increasingly Connected Medical Devices
    Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
    DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
    Dark Reading Staff 6/30/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-15505
    PUBLISHED: 2020-07-07
    MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1, and Sentry before 9.7.3 and 9.8.x before 9.8.1, allow remote attackers to execute arbitrary code via unspecified vectors.
    CVE-2020-15506
    PUBLISHED: 2020-07-07
    MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1 allow remote attackers to bypass authentication mechanisms via unspecified vectors.
    CVE-2020-15507
    PUBLISHED: 2020-07-07
    MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1 allow remote attackers to read files on the system via unspecified vectors.
    CVE-2020-15096
    PUBLISHED: 2020-07-07
    In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affecte...
    CVE-2020-4075
    PUBLISHED: 2020-07-07
    In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not ...