Poor Staff Collaboration and Complexity of Software Hamper Security Efforts

Nearly a third of organizations report that collaboration between IT security and IT operations people is non-existent, and more than half believe collaboration between security and operations can be improved. That lack of communication could hurt environments where the adoption of mobile devices, cloud computing, and collaborative technologies is happening faster than organizations are able to adapt security policies, resulting in greater risk to sensitive data. The challenge is heightened owing to the complexity of endpoint management systems, whose features cross security and operation lines in most environments.

Those results come from a wide-ranging survey done by security research firm Ponemon Institute and commissioned by Lumension, which sells computer security products.

Endpoint security protects an organization's network from threats that include as virus and malware attacks, cyber crime, and employees' unauthorized use of mobile devices, as well as illegal applications on laptops, desktops, and other Internet-connected devices provided by the enterprise. The five most important features for managing endpoint security were identified by respondents as anti-virus and anti-malware technology (80 percent), whole disk encryption (70 percent), application control (69 percent), patch and remediation management (68 percent), and IT asset management (61 percent). The average organization has 3.7 software agents installed on each endpoint to perform management, security, and other operations and an average of 3.9 different software management consoles for endpoint operations and security.

The survey questioned 1,427 IT security practitioners and 1,582 IT operations professionals in the United States, Germany, Australia, New Zealand, and the United Kingdom with active responsibility for their data security and compliance efforts.

According to the survey, "Worldwide State of the Endpoint 2010":

  • 56 percent of respondents said mobile devices aren't secure, representing a risk to data security;
  • 49 percent said data security isn't a strategic initiative for their companies;
  • 48 percent said their organizations have allocated insufficient resources to achieve effective data security and regulatory compliance; and
  • 41 percent of individuals said there was a lack of proactive security risk management in their organizations.

Lumension said it commissioned the survey to better understand how emerging technologies, such as Web 2.0, mobile computing, and the "consumerization" of IT--the accommodation and integration of employee-owned mobile devices within the enterprise--are affecting environments and how organizations are managing security risks across IT operations and security. According to the study, four out of 10 respondents said their organizations permit users to connect their own computing devices to its network or enterprise systems. However, only a quarter of organizations have a policy guiding those connections.

This suggests, the report explained, that many organizations aren't taking steps to secure mobile devices personally owned by users. Yet 72 percent of respondents said they view negligent insiders as a top security threat heading into 2010.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • interconnected cloud icons with glowing lines on a gradient blue backdrop

    Report: Cloud Certifications Bring Biggest Salary Payoff

    It pays to be conversant in cloud, according to a new study from Skillsoft The company's annual IT skills and salary survey report found that the top three certifications resulting in the highest payoffs salarywise are for skills in the cloud, specifically related to Amazon Web Services (AWS), Google Cloud, and Nutanix.

  • AI-inspired background pattern with geometric shapes and fine lines in muted blue and gray on a dark background

    IBM Releases Granite 3.0 Family of Advanced AI Models

    IBM has introduced its most advanced family of AI models to date, Granite 3.0, at its annual TechXchange event. The new models were developed to provide a combination of performance, flexibility, and autonomy that outperforms or matches similarly sized models from leading providers on a range of benchmarks.

  • landscape photo with an AI rubber stamp on top

    California AI Watermarking Bill Garners OpenAI Support

    ChatGPT creator OpenAI is backing a California bill that would require tech companies to label AI-generated content in the form of a digital "watermark." The proposed legislation, known as the "California Digital Content Provenance Standards" (AB 3211), aims to ensure transparency in digital media by identifying content created through artificial intelligence. This requirement would apply to a broad range of AI-generated material, from harmless memes to deepfakes that could be used to spread misinformation about political candidates.

  • happy woman sitting in front of computer

    Delightful Progress: Kuali's Legacy of Community and Leadership

    CEO Joel Dehlin updates us on Kuali today, and how it has thrived as a software company that succeeds in the tech marketplace while maintaining the community values envisioned in higher education years ago.