Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Enterprises Struggle to Identify Sources of Risk

Security remains top priority, but businesses wrestle with business case, BT study says

Enterprises are putting a good deal of emphasis on risk management these days, but they don't all agree on how to measure risk, according to a new industry study.

The annual security study, which will be published Friday by service provider BT, offers a look at enterprise security priorities and perceived threats. The upshot: Although managing risk has become an important thread in IT security, making a business case for security technology is still a challenge.

In the survey, 83 percent of enterprises placed "improving security" among their top priorities for the next 12 months. Twenty-two percent said it is their first priority. More than a third of respondents plan to implement risk management tools across all of their business units in the next 12 months; another 26 percent will implement such tools with some business units.

But identifying the source of the risk -- and making a business case for investing in the technology required to reduce it -- remain elusive targets for many enterprises, the study says.

For one thing, the fear of internal attacks seems to have diminished over the past two years. In 2006, about 40 percent of respondents said internal attacks were their top concern; that figure has dropped to 33 percent. In 2006, some 37 percent of executives felt that internal attacks were the most potentially damaging or costly; that figure has dropped to 35 percent.

"It seems that the pendulum, which had swung toward internal concerns, is now swinging the other way," says Dustin Owens, one of the leaders of the security research project.

At the same time, however, executives who responded to the survey indicated that end users remain the weakest link in the security chain. Thirty percent of respondents indicated that "inadequately trained/unconcerned users" are their biggest concern when evaluating potential security breaches.

"Given all the attention that's been paid to user awareness in the past few years, it's sort of surprising that the user issue continues to be such a big part of the problem," says Rick Blum, director of strategic marketing at BT. "It's proof that security awareness training can only get you so far."

And despite heavy emphasis on security issues, many organizations still don't review their environments for potential vulnerabilities as often as they should, according to the study. Only about 48 percent of enterprises said they evaluate their security postures as often as four times a year.

Part of the problem is that security pros need to do a better job of making a business case, the study says. "This will require quantifying the potential cost of data loss as well as downtime caused by a virus or other attack," the report states. "These costs should take into account financial damages (outright theft), recovery costs (notification of affected parties, etc.), and loss of reputation (leading to loss of business)."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • BT Global Services

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Data Leak Week: Billions of Sensitive Files Exposed Online
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
    Intel Issues Fix for 'Plundervolt' SGX Flaw
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    The Year in Security: 2019
    This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-12-14
    There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
    PUBLISHED: 2019-12-14
    Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
    PUBLISHED: 2019-12-13
    There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
    PUBLISHED: 2019-12-13
    Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
    PUBLISHED: 2019-12-13
    Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...