Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/20/2014
06:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

IT Pros Okay With Government's Role In Cybersecurity

Most U.S. IT pros see feds' involvement in security a positive, new Dell survey shows

So much for the Snowden effect: nearly 80 percent of U.S. IT leaders say the federal government plays a key and positive role in protecting enterprises from internal and external cyberthreats, a new survey commissioned by Dell Software found.

"How people think about government is particularly interesting, [as] 78 percent [in the U.S.] say it's helping," says Bill Evans, senior director of product marketing for Dell. The survey of 1,440 IT decision-makers worldwide in organizations with more than 500 users was conducted between October and November of last year.

"I don't know if people are believing there is a business value in compliance and government mandates or if frameworks are of value. This is one of the areas I'd like to delve deeper into," Evans says. But it seems to bode well for the new NIST Cyber Security Framework, he says.

Close to 90 percent of all respondents worldwide say government should help determine security defense strategies of organizations.

Meanwhile, three-fourths of organizations say they have been hit by a security breach within the past 12 months, while more than 80 percent say their current security processes let them identify a breach, but actual detection takes an average of seven hours.

But interestingly, just 18 percent of IT pros say the detection and prediction of unknown threats is a top concern. "What we took from that is that security pros are focused on things they know have to be focused on," Evans says. "They're trying to do a good job, spending more money, but becoming less secure ... They don't have time to focus on unknown threats."

Even so, they could solve some of those "unknown" threats with existing technologies, he says, such as identity management, encryption, and next-generation firewalls, Evan says.

Around 64 percent of all IT pros say their organizations must reorganize or restructure their IT processes to keep pace with new security threats; some 85 percent of U.S. IT pros believe this.

Nearly 70 percent are spending more money on user education and training for security in the past year, and about half say user education is a priority. More than half of the organizations worldwide have increased funding for monitoring services, and 72 percent of U.S. organizations have done so.

Mobile devices are dogging IT pros. While 93 percent allow personal devices to be used on the job, 57 percent say mobile security is a top concern in the next five years, and nearly one-fourth say the misuse or vulnerabilities of those devices are the root cause of breaches.

The full report by Dell is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24259
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24260
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24261
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
CVE-2021-24262
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
CVE-2021-24263
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...