Putting the pieces in place for effective security delivery
Much has been written about the existence of various threats, internal and external, and vendors are only too quick to proffer solutions to the problems. But what really needs to exist for security to work? This report considers some of the more behavioural aspects of security best practice, such as the role of awareness, policy and communications.
IT security matters - but some organisations are doing better than others
While IT security is generally seen as important to our IT-oriented research sample, there is a general feeling that such aspects as the level of security awareness, and how seriously IT security is taken by business management, could be better. Such characteristics can be used to determine organisations that generally are ahead of the pack, and those who are lagging behind.
Leading organisations believe themselves to be better protected, and rightly so
In general, organisations that we have categorised as 'leaders' believe themselves to be better protected than the 'laggards'. It is not always as simple as this when it comes to a reduction in threat levels, as it will tend to be those threats that are directly influenced by good security practices, that show the most marked improvements.
Having a comprehensive security policy is fundamental to good security practice
Organisations with a fully comprehensive, dynamic security policy are less likely to suffer security breaches such as web site defacement, or indeed theft. It is therefore no surprise to note that the more leading organisations are twice as likely to have such a policy in place than the sample as a whole. Equally notable is that organisations with outdated policies fare less well than those with no policy in place at all.
Communication between the business and IT is also important
Few would doubt that business risks should be prioritised as an input to implementing good security practice. There is a big difference of opinion between the leaders and the laggards however, concerning how important it is to communicate this information both to IT, and to the workforce. And indeed, such co-ordination has a tangible impact on risk reduction.
More progressive IT security organisations are deploying more complex tooling IT security tools are in general bought more on the basis of simplicity than need - tools that are easy to cost-justify and deploy are far more likely to be in place than more complex tools. However, leading edge organisations are installing the more challenging tools. The lesson is not to install everything, but to review one's own situation and make the necessary improvements that become apparent.