Confidence in Effective Cyber-Protection Wanes

 
 
By Karen A. Frenkel  |  Posted 07-03-2015 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Confidence in Effective Cyber-Protection Wanes
    Next

    Confidence in Effective Cyber-Protection Wanes

    By Karen A. Frenkel
  • Previous
    Low Confidence in Deployed Security Technologies
    Next

    Low Confidence in Deployed Security Technologies

    27% of surveyed IT decision-makers said they are "confident" that technologies they have implemented will work against cyber-threats. 58% report being "somewhat confident" and are seeking alternatives.
  • Previous
    Security Technologies in Use
    Next

    Security Technologies in Use

    Respondents are using the following cyber-protection technologies: Traditional firewall: 86%, Anti-virus software: 71%, IDS/IPS technologies: 59%, Log management: 58%, SIEM: 44%
  • Previous
    Cyber-Insurance Is Not Popular
    Next

    Cyber-Insurance Is Not Popular

    Despite concerns about cyber-vulnerability, only 21% of respondents said they have cyber-insurance.
  • Previous
    Lack of Preparedness
    Next

    Lack of Preparedness

    Just 15% of respondents said their employees are "well-prepared" to spot the signs of an attack and react accordingly. 28% said they are well-prepared for a breach.
  • Previous
    IT Infrastructure Is Vulnerable
    Next

    IT Infrastructure Is Vulnerable

    72% of respondents said their IT infrastructure is "not well protected" and is vulnerable to advanced persistent threats.
  • Previous
    Rethinking Infrastructure
    Next

    Rethinking Infrastructure

    52% of respondents said rethinking their infrastructure to keep pace with advanced persistent threats is a priority.
  • Previous
    Brand Reputation Is at Risk
    Next

    Brand Reputation Is at Risk

    68% of respondents said their reputation is more at stake than their financials due to vulnerability to cyber-attacks. 19% said they could withstand a small financial hit while 13% said a cyber-attack would devastate them financially.
  • Previous
    Top Security Concerns
    Next

    Top Security Concerns

    Areas of greatest concern are: Network perimeter: 23%, Endpoints: 21%, Web applications: 14%
  • Previous
    Prioritized Security Initiatives
    Next

    Prioritized Security Initiatives

    Respondents ranked security initiatives, in terms of priority, as follows: 1: Network monitoring, 2: Antivirus software, 3: Data encryption, 4: IT security professional, 5: Cyber-insurance policy, 6: Provider of managed services
 

Few technology leaders are confident that traditional firewalls, antivirus software, IDS/IPS technologies, log management and SIEM mitigate the risk of security incidents, according to a new study. Despite this, few have cyber-insurance. The study, conducted by security intelligence, risk and compliance solutions firm EiQ Networks, is based on 168 IT decision-makers' responses. The respondents are senior managers, security managers, directors and network and systems engineers in small and midsize enterprises in the health care, government, financial services and retail industries. "Companies today have serious gaps in their security programs, specifically the people, processes and technology they need to protect their valuable customer and corporate data and intellectual property," said Vijay Basani, chairman, president and CEO of EiQ Networks. "In today's heightened threat environment, companies need to adopt a multipronged, comprehensive security program that addresses vulnerabilities related to people, process, technology and culture."

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register