Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

12/19/2016
12:00 PM
Dark Reading Staff
Dark Reading Staff
Products and Releases
50%
50%

Cybersecurity Is Maturing, People Still the Problem: Nuix

A Nuix executive survey discovered cybersecurity approaches are maturing, but spending is misdirected and human behavior is the largest security threat.

Global technology company Nuix today released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective technologies and capabilities to focus on.

"Cybersecurity no longer has an air of mystery about it for executives and directors but human behavior and technological uncertainty remain prominent barriers to corporate confidence," said Ari Kaplan, the report's author.

The research surveyed respondents' current and planned spending across all five categories in the NIST Cybersecurity Framework: identify, protect, detect, respond, and recover. Nearly four in five respondents (79%) said they had increased spending on data breach detection in the past year and 72% said they planned to do so next year. However, a majority of respondents (52%) said preventing data breaches was their top spending priority, while 42% said detection was their primary focus.

"We still see a lot of companies spending too much money and effort on breach prevention technologies that don't prevent data breaches and detection measures that don't detect them until months later," said Dr. Jim Kent, Global Head of Security & Intelligence at Nuix. "That means they have less to spend on incident response and recovery just when they need those things most. The answer must be more balanced spending across all the priorities but also more targeted spending on solutions that work."

Security executives almost unanimously agreed that human behavior was their greatest vulnerability (97% of participants in this year's survey, up from 93% last year and 88% in 2014). To counter this threat, businesses are less likely to use fear to convey important security ideas—24% of this year's respondents tried to scare people, compared with 39% last year. Instead, security leaders are using policies, awareness, and training to help people become part of the solution.

"Where this breaks down is that a large proportion of people, even after they've had security awareness training, will still put their organizations at risk by opening malicious attachments and visiting suspect websites," said Kent. "While the policies and training are crucial, we need to get better at 'idiot-proofing' our technology so that even if people do the wrong thing, the malware doesn't run or doesn't achieve its goals."

The report Defending Data: Cybersecurity Maturity Reflects Growth in How Corporations Manage and Protect Information From Increasingly Sophisticated Threats was written by Ari Kaplan Advisors and sponsored by Nuix. It is available from www.nuix.com/defending-data.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-36197
PUBLISHED: 2021-05-13
An improper access control vulnerability has been reported to affect earlier versions of Music Station. If exploited, this vulnerability allows attackers to compromise the security of the software by gaining privileges, reading sensitive information, executing commands, evading detection, etc. This ...
CVE-2020-36198
PUBLISHED: 2021-05-13
A command injection vulnerability has been reported to affect certain versions of Malware Remover. If exploited, this vulnerability allows remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. Malware Remover versions prior to 4.6.1.0. This issue does not affect: QNAP...
CVE-2021-28799
PUBLISHED: 2021-05-13
An improper authorization vulnerability has been reported to affect QNAP NAS running HBS 3 (Hybrid Backup Sync. ) If exploited, the vulnerability allows remote attackers to log in to a device. This issue affects: QNAP Systems Inc. HBS 3 versions prior to v16.0.0415 on QTS 4.5.2; versions prior to v3...
CVE-2021-22155
PUBLISHED: 2021-05-13
An Authentication Bypass vulnerability in the SAML Authentication component of BlackBerry Workspaces Server (deployed with Appliance-X) version(s) 10.1, 9.1 and earlier could allow an attacker to potentially gain access to the application in the context of the targeted user’s acco...
CVE-2021-23134
PUBLISHED: 2021-05-12
Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.2 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.