SlideShare a Scribd company logo
1 of 9
@StoretecHull

www.storetec.net

Facebook.com/storetec
Storetec Services Limited

Cyber Security Response 'Could Make
Companies More Vulnerable'
Many companies are taking new steps in an attempt to make their data
and IT systems more secure, but they might actually have the opposite
effect.
This is the view of Gartner's 2013 Global Risk Management Strategy,
which claims that the fear of more advanced forms of cyber attack is
causing companies to move away from well-established security
measures like enterprise risk management and risk-based information
security.
Instead of using such methods, they are instead seeking to use
technical security, a survey by Gartner of 555 organisations in the UK,
US, Canada and Germany showed. The proportion of organisations
using enterprise risk management halved from 12 per cent to six per
cent.
However, Gartner argues, this actually makes them more vulnerable to
emerging threats, suggesting that the FUD (fear, uncertainty and doubt)
trap is snaring a growing number of enterprises.
Research director at Gartner John Wheeler commented: "While the
shift to strengthening technical security controls is not surprising, given
the hype around cyberattacks and data security breaches, strong riskbased disciplines, such as enterprise risk management or risk-based
information security, are rooted in proactive, data-driven decision
making.
"These disciplines focus squarely on the uncertainty risk as well as the
methods or controls to reduce it. By doing so, the associated fear and
doubt are subsequently eliminated."
He argued that this will mean that companies will cease to be vigilant
towards risk-based threats and therefore be more prone to falling victim
to them. The result of this will be an eventual shift back to risk-based
strategies when firms realise their benefits, but by then many will have
suffered the consequences of the change.
One positive impact of the FUD factor suggested by the report is that
concerned companies will raise their levels of IT security investment
and staffing. In the survey, 39 per cent of firms revealed they had
dedicated over seven per cent of their IT budget to security in 2013,
compared with only 23 per cent last year.
However, the survey found, there was no guarantee that such budgets
will be maintained in the future, while the proportion of companies
handling IT risk through management committees fell year-on-year
from 53 per cent to 39 per cent.
"These incongruent survey findings seem to validate the observation
that risk-based, data-driven approaches are falling to the wayside in
favor of FUD-based, emotion-driven activities," Mr Wheeler
commented.
"Or, perhaps more disturbingly, they indicate that those who have
concerns are simply burying their head in the sand, rather than
proactively addressing emerging threats," he added.

For companies concerned about their information security, there is an
alternative approach. Rather than worry about throwing lots of money
at such issues in this year's budget but not in 2014-15, how much
management input (or expertise) there is, or whether the overall
approach to risk and cyber threats is the right one, a sensible approach
may be to use the services of a remote host who can store data safely,
securely and remotely.
By doing this the issues can be outsourced to dedicated professionals
who can identify risks, know the latest means of tackling threats, just
what those dangers are and what the most appropriate response is.
In the case of the UK, the need to do this may be considerable. The
Gartner report suggests that companies may lose out by changing the
way they seek to deal with IT security matters. However, for some the
problem is worse still – a lack of any kind of concerted approach
towards cyber threats and thus a high level of vulnerability.
This was the conclusion of Ernst & Young's Global Information Security
Survey 2013, published last week, which found 66 per cent of senior
company executives reported the number of cyber attacks on their
firms had jumped by five per cent or more in the past year.
Perhaps the most alarming finding of the survey was that only four per
cent of those polled said they believed their in-house security systems
were robust enough to ward off such attacks.

Information security director for Ernst & Young Mark Brown said
companies need to face the reality that it is a question of when they will
be targeted, not if.
Storetec News/Blogs."http://www.storetec.net/news-blog/cybersecurity-response-could-make-companies-more-vulnerable/".
Cyber Security Response 'Could Make Companies More
Vulnerable'. November 8, 2013. Storetec.

More Related Content

Viewers also liked

The power and limitation of leadership and organisational metaphors
The power and limitation of leadership and organisational metaphorsThe power and limitation of leadership and organisational metaphors
The power and limitation of leadership and organisational metaphorsOlaojo Aiyegbayo
 
Value of remote working emphasised by new great storm
Value of remote working emphasised by new great stormValue of remote working emphasised by new great storm
Value of remote working emphasised by new great stormJohn Davis
 
PERFIL DEL ESTUDIANTE - UNIVERSITARIO
PERFIL DEL ESTUDIANTE - UNIVERSITARIOPERFIL DEL ESTUDIANTE - UNIVERSITARIO
PERFIL DEL ESTUDIANTE - UNIVERSITARIOSiré B.
 
IKRA Creative Agency Presentation (ENG)
IKRA Creative Agency Presentation (ENG)IKRA Creative Agency Presentation (ENG)
IKRA Creative Agency Presentation (ENG)IKRA Creative agency
 
Distrito 1 guadalajara D1 sd01-consulta2011
Distrito 1 guadalajara D1 sd01-consulta2011Distrito 1 guadalajara D1 sd01-consulta2011
Distrito 1 guadalajara D1 sd01-consulta2011Mario Mendoza
 
Barrukodinamika
BarrukodinamikaBarrukodinamika
Barrukodinamikasonri15
 
data science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecturedata science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecturechris wiggins
 

Viewers also liked (8)

The power and limitation of leadership and organisational metaphors
The power and limitation of leadership and organisational metaphorsThe power and limitation of leadership and organisational metaphors
The power and limitation of leadership and organisational metaphors
 
Value of remote working emphasised by new great storm
Value of remote working emphasised by new great stormValue of remote working emphasised by new great storm
Value of remote working emphasised by new great storm
 
Revolt of 1857
Revolt of 1857Revolt of 1857
Revolt of 1857
 
PERFIL DEL ESTUDIANTE - UNIVERSITARIO
PERFIL DEL ESTUDIANTE - UNIVERSITARIOPERFIL DEL ESTUDIANTE - UNIVERSITARIO
PERFIL DEL ESTUDIANTE - UNIVERSITARIO
 
IKRA Creative Agency Presentation (ENG)
IKRA Creative Agency Presentation (ENG)IKRA Creative Agency Presentation (ENG)
IKRA Creative Agency Presentation (ENG)
 
Distrito 1 guadalajara D1 sd01-consulta2011
Distrito 1 guadalajara D1 sd01-consulta2011Distrito 1 guadalajara D1 sd01-consulta2011
Distrito 1 guadalajara D1 sd01-consulta2011
 
Barrukodinamika
BarrukodinamikaBarrukodinamika
Barrukodinamika
 
data science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecturedata science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecture
 

More from John Davis

Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network John Davis
 
Data protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearData protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearJohn Davis
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataJohn Davis
 
Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacksJohn Davis
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryJohn Davis
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data riskJohn Davis
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsJohn Davis
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problemJohn Davis
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’John Davis
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firmsJohn Davis
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’John Davis
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionJohn Davis
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’John Davis
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’John Davis
 
Data security breach may embarrass fa
Data security breach may embarrass faData security breach may embarrass fa
Data security breach may embarrass faJohn Davis
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsJohn Davis
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’John Davis
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say expertsJohn Davis
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeJohn Davis
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacksJohn Davis
 

More from John Davis (20)

Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network
 
Data protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearData protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a year
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacks
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recovery
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data risk
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concerns
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problem
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firms
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 million
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’
 
Data security breach may embarrass fa
Data security breach may embarrass faData security breach may embarrass fa
Data security breach may embarrass fa
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegations
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say experts
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Cyber security response 'could make companies more vulnerable'

  • 1. @StoretecHull www.storetec.net Facebook.com/storetec Storetec Services Limited Cyber Security Response 'Could Make Companies More Vulnerable' Many companies are taking new steps in an attempt to make their data and IT systems more secure, but they might actually have the opposite effect. This is the view of Gartner's 2013 Global Risk Management Strategy, which claims that the fear of more advanced forms of cyber attack is causing companies to move away from well-established security measures like enterprise risk management and risk-based information security.
  • 2. Instead of using such methods, they are instead seeking to use technical security, a survey by Gartner of 555 organisations in the UK, US, Canada and Germany showed. The proportion of organisations using enterprise risk management halved from 12 per cent to six per cent. However, Gartner argues, this actually makes them more vulnerable to emerging threats, suggesting that the FUD (fear, uncertainty and doubt) trap is snaring a growing number of enterprises.
  • 3. Research director at Gartner John Wheeler commented: "While the shift to strengthening technical security controls is not surprising, given the hype around cyberattacks and data security breaches, strong riskbased disciplines, such as enterprise risk management or risk-based information security, are rooted in proactive, data-driven decision making. "These disciplines focus squarely on the uncertainty risk as well as the methods or controls to reduce it. By doing so, the associated fear and doubt are subsequently eliminated."
  • 4. He argued that this will mean that companies will cease to be vigilant towards risk-based threats and therefore be more prone to falling victim to them. The result of this will be an eventual shift back to risk-based strategies when firms realise their benefits, but by then many will have suffered the consequences of the change. One positive impact of the FUD factor suggested by the report is that concerned companies will raise their levels of IT security investment and staffing. In the survey, 39 per cent of firms revealed they had dedicated over seven per cent of their IT budget to security in 2013, compared with only 23 per cent last year.
  • 5. However, the survey found, there was no guarantee that such budgets will be maintained in the future, while the proportion of companies handling IT risk through management committees fell year-on-year from 53 per cent to 39 per cent. "These incongruent survey findings seem to validate the observation that risk-based, data-driven approaches are falling to the wayside in favor of FUD-based, emotion-driven activities," Mr Wheeler commented.
  • 6. "Or, perhaps more disturbingly, they indicate that those who have concerns are simply burying their head in the sand, rather than proactively addressing emerging threats," he added. For companies concerned about their information security, there is an alternative approach. Rather than worry about throwing lots of money at such issues in this year's budget but not in 2014-15, how much management input (or expertise) there is, or whether the overall approach to risk and cyber threats is the right one, a sensible approach may be to use the services of a remote host who can store data safely, securely and remotely.
  • 7. By doing this the issues can be outsourced to dedicated professionals who can identify risks, know the latest means of tackling threats, just what those dangers are and what the most appropriate response is. In the case of the UK, the need to do this may be considerable. The Gartner report suggests that companies may lose out by changing the way they seek to deal with IT security matters. However, for some the problem is worse still – a lack of any kind of concerted approach towards cyber threats and thus a high level of vulnerability.
  • 8. This was the conclusion of Ernst & Young's Global Information Security Survey 2013, published last week, which found 66 per cent of senior company executives reported the number of cyber attacks on their firms had jumped by five per cent or more in the past year. Perhaps the most alarming finding of the survey was that only four per cent of those polled said they believed their in-house security systems were robust enough to ward off such attacks. Information security director for Ernst & Young Mark Brown said companies need to face the reality that it is a question of when they will be targeted, not if.