Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Many IT professionals still not confident of preventing a cyber attack

16/09/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmtqvmzevndu3l2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Despite the number of high profile attacks in recent months, many organisations are still lacking confidence in their ability to prevent a cyber attack or data breach.

These are the findings of a new survey from risk consultancy firm Protiviti, which also shows that companies aren't properly preparing for crises and often don’t have adequate core data policies.

"Our survey results tell a story of gaps between where companies currently stand and where they should be in relation to fundamental elements of IT security. Some progress has been made since our last survey, yet many organisations still fall short of important standard protocols for IT security and privacy," says Ryan Rubin, managing director with Protiviti and UK leader of the firm's IT security and privacy practice.

"Companies need to take more action in relation to the risks they recognise to better protect their crucial data".

The survey uncovers five main themes which indicate that companies need to improve their data policies. First is a lack of confidence in their ability to prevent attacks. Despite executive management having a higher awareness of the possibility of attack, the creativity of attackers leads to lower confidence among IT staff.

Secondly, companies are not preparing for crises. The survey finds a year-on-year jump in the number of organisations without a formal and documented crisis response plan to execute in the event of a data breach or cyber attack.

Third, board-level engagement leads to better preparation. Organisations whose boards are concerned with how the organisation is addressing its risks, have significantly stronger IT security profiles. However, the survey finds that one in five boards have low engagement.

Lack of policy is the fourth key theme. One in three companies doesn't have a written information security policy and over 40 per cent lack a data encryption policy. One in four don't have acceptable use or record retention/destruction policies. These represent critical gaps in data governance and management, and they can carry major legal implications.

This article has been extracted from http://www.itproportal.com/, please click on this link to read the article in full http://www.itproportal.com/2014/09/16/many-it-professionals-still-not-confident-of-preventing-a-cyber-attack/#ixzz3DTRORtD9

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

 
 
comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...