Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 23 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Survey Reveals 69% of Users Would Bypass Security Controls to Win Business

by The Gurus
November 19, 2015
in Editor's News
Share on FacebookShare on Twitter

Balabit, a leading provider of contextual security technologies, today unveiled the results of its pan-European survey into the current state of IT security.
The survey looked at how organisations balance IT security and business flexibility; whether they choose to be more secure by implementing additional controls that might hinder productivity or prefer to have flexible business operations. It also looked at how a promising business opportunity changes the game.
Balabit asked 381 IT executives, CIO’s, CISO’s, auditors and other IT professionals including, but not limited to, the UK, France and Germany, about their thoughts on IT security and business flexibility. When asked about their preference if they need to choose between IT security and business flexibility, 71% of respondents said that security should be equally or more important than business flexibility.  
What happens when money comes into the picture?
The same people were asked if they would take the risk of a potential security threat in order to achieve the biggest deal of their life. In this situation security just goes out of the window with 69% of respondents saying they would take the risk, while only 31% said they would not.
“These results show that organisations have a long way to go to balance security and business” said Zoltán Györkő, CEO at Balabit. “They demonstrate that while security overload may be tolerated during normal business, when it comes to big deals the respondents would not hesitate to bypass security to win business. It is important that this is recognised as an issue and dealt with accordingly.”
In order to provide a healthy balance of IT security and business flexibility in practice, organisations require IT security solutions that do not impose onerous processes on users. When processes are bypassed by an insider, or indeed by someone that has gained fraudulent insider access, there is an escalated risk of privileged account misuse. 
According to the latest Ponemon Institute Research criminal insiders cause the most data breaches. Because insider misuse cannot be spotted by existing control based security tools, a different approach is required.
“The survey shows that security strategies must take into account human behaviour” continued Györkő, CEO. ”Today’s static control solutions can only go so far. Security teams must have visibility of the context of user actions to be able to respond effectively, and any additional tools must be transparent to the business workflow. We believe that a monitoring based approach that enables companies to respond to suspicious activities in real time can make IT security more business friendly; that is why we developed our Contextual Security Intelligence Suite.”
For more information on the survey visit https://pages.balabit.com/csi-survey.html
About the survey
BalaBit surveyed 381 conference attendees at the EIC (European Identity & Cloud conference 2015) in Munich, InfoSecurity in London and Moscow, Les Assises in Monaco, Confidence and IDC Security Roadshow in Poland. IT executives, auditors, CIOs, and CISOs participating in this survey represented organizations including the telco, finance, government and manufacturing sectors.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Elite Comms Group launches unique trilogy of managed IT Solutions to help protect businesses from cyberattacks, internal data leaks and IT System downtime

Next Post

Omni-Channel Retail needs Omni-Security says iSheriff

Recent News

Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information