Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

8/22/2008
01:55 AM
50%
50%

Survey: Mid-Sized Firms Shape Up for Security

Security outweighs cost reduction as firms' biggest concern

By James Rogers, August 22, 2008, 9:55 AM

Most mid-sized U.S. firms rate information security as a higher priority than reducing business costs, according to research released this week by services specialist Arrow Electronics Inc.

The survey of 200 U.S. companies revealed that almost 80 percent of firms rate security as a top business issue, compared to 69 percent who cited ‘cost reduction,’ and 64 percent who listed improving customer service as their major concern.

Companies surveyed by Arrow had annual revenues ranging from less than $100 million to over $1 billion.

“These findings affirm what we’re hearing from our business partners who are on the front lines with midmarket companies, the fastest growing sector of the economy,” said Mark Taylor, general manager of Arrow’s midmarket group in a statement released yesterday. “Information Security offerings are a top priority.”

These sentiments were echoed by the IT user community.

“I think that when it comes to losing data because of viruses, hackers, or other threats, that definitely is a top concern, and I would agree with the Arrow survey, [security] outweighs cost concern,” wrote David Vellante, co-founder and principal contributor of the Wikibon user group in an email to Byte and Switch. “These are often fast-growing enterprises, and while they’re cost conscious, they often can’t get the leverage a big company can get out of cost-cutting measures.”

Despite the importance of security within mid-sized businesses, only 32 percent of respondents said that they were satisfied with how their company is addressing security concerns.

”I believe that the 32 percent of respondents that are ‘very satisfied’ with how their company is addressing security concerns are deluding themselves -- they should wake up and smell the coffee,” wrote Vellante. “As an industry, since 2000 we’ve spent billions on security in the form of virus protection, network security, firewalls and other infrastructure… do you feel more secure? No way!”

The challenge for many, particularly smaller firms, is linked to the fact that IT is becoming ever more complex, according to Vellante.

”Data growth is more difficult to manage than ever,” he wrote. “The gap between our ability to manage complexity and the rate of complexity growth is widening, not shrinking, making us less secure.”

The research also reveals that some 54 percent of midsized companies feel that they could be on a ‘level playing field’ with Fortune 500-size companies if they had access to the same technology, and a third of respondents acknowledged that their IT systems are not up to date.

”For the midmarket guys I talk to, technology is not the problem,” wrote Vellante. “It’s the skills and best-practice knowledge as to how to apply the technology to create business systems -- that is what is lacking at midmarket firms.”

In addition to outdated systems, IT executives’ top challenges are “integration of technology” and “IT resources to implement functionality,” which were both cited by almost half of the respondents. Other challenges/limitations to technology investments are “user training” (46 percent) and “lack of local talent” (29 percent).

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Byte and Switch's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Vulnerability Disclosure Programs See Signups & Payouts Surge
Kelly Sheridan, Staff Editor, Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15216
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
CVE-2020-4607
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...