Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 9 December, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cybersecurity Approaches Are Maturing but Spending Is Misdirected and People Are Still the Problem

by The Gurus
January 3, 2017
in Editor's News
Share on FacebookShare on Twitter

Global technology company Nuix has released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behaviour was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective technologies and capabilities to focus on.
“Cybersecurity no longer has an air of mystery about it for executives and directors but human behavior and technological uncertainty remain prominent barriers to corporate confidence,” said Ari Kaplan, the report’s author.
The research surveyed respondents’ current and planned spending across all five categories in the NIST Cybersecurity Framework: identify, protect, detect, respond, and recover. Nearly four in five respondents (79%) said they had increased spending on data breach detection in the past year and 72% said they planned to do so next year. However, a majority of respondents (52%) said preventing data breaches was their top spending priority, while 42% said detection was their primary focus.
“We still see a lot of companies spending too much money and effort on breach prevention technologies that don’t prevent data breaches and detection measures that don’t detect them until months later,” said Dr. Jim Kent, Global Head of Security & Intelligence at Nuix. “That means they have less to spend on incident response and recovery just when they need those things most. The answer must be more balanced spending across all the priorities but also more targeted spending on solutions that work.”
Security executives almost unanimously agreed that human behavior was their greatest vulnerability (97% of participants in this year’s survey, up from 93% last year and 88% in 2014). To counter this threat, businesses are less likely to use fear to convey important security ideas—24% of this year’s respondents tried to scare people, compared with 39% last year. Instead, security leaders are using policies, awareness, and training to help people become part of the solution.
“Where this breaks down is that a large proportion of people, even after they’ve had security awareness training, will still put their organizations at risk by opening malicious attachments and visiting suspect websites,” said Kent. “While the policies and training are crucial, we need to get better at ‘idiot-proofing’ our technology so that even if people do the wrong thing, the malware doesn’t run or doesn’t achieve its goals.”
 
The report Defending Data: Cybersecurity Maturity Reflects Growth in How Corporations Manage and Protect Information From Increasingly Sophisticated Threats was written by Ari Kaplan Advisors and sponsored by Nuix. It is available from www.nuix.com/defending-data.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Real world cases cause IoT to go mainstream

Next Post

Symantec Research Provides Key Evidence for International Cybercriminal Takedown

Recent News

New Synopsys Report Reveals Application Security Automation Soars

December 5, 2023
Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud

Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud

December 5, 2023
Centripetal real logo

Centripetal Announces Partnership With Tiger to Provide Cybersecurity Innovation to the UK Market

December 7, 2023
Google bins inactive accounts

Google bins inactive accounts

December 1, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information