Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Short On Staff, Many IT Organizations Feel Unprepared For New Threats

Lack of resources causes many enterprises to lose security efficiency, Symantec study says

More than half of C-level and IT professionals don't feel confident in their IT security staffs’ ability to respond to new and emerging threats, according to a study published Wednesday.

Symantec says in its "2011 Threat Management Survey" that most organizations feel short-staffed in security, leading to concerns that their ability to stop attackers is inadequate.

Forty-six percent of those who lacked confidence indicated insufficient security staff was a top factor, according to the study. A similar number (45 percent) cited a lack of time to respond to new threats for their existing staff. Overall, 43 percent of organizations worldwide reported they are somewhat or extremely understaffed. In North America, respondents were much more likely to report understaffing, with 53 percent reporting staffing challenges.

Those who lack confidence in their ability to respond to threats also reported issues with staff effectiveness. Sixty-six percent rate their staff as less than effective, and only 4 percent rate their staff as completely effective. The top three issues impacting staff effectiveness were recruiting (46 percent), retention (42 percent), and skill set gaps with existing staff (35 percent).

"We saw a strong correlation between those who said they were short on staff and those who felt their staff is ineffective," said David Dorosin, director of product marketing for the Threat and Risk Management group at Symantec. "I see those results as two sides to the same coin."

Respondents also cited other problems with security, including keeping up with changes in the threat landscape, maintaining adequate visibility of their own infrastructure, and managing security log and alert data in a timely and effective manner.

Sixty-eight percent identified threat intelligence as one of their top two concerns. Forty-nine percent ranked security visibility as a top concern. Forty-five percent reported they are concerned about their ability to properly correlate and analyze the security information and alerts that are being generated by their security systems.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at Fortinet,  5/24/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .