Cyber

Threat report

by Mark Rowe

Old habits are dying hard, according to a report by a cybersecurity and data security firm. The 2017 Thales Data Threat Report, issued with analyst firm 451 Research, says most respondents have experienced a breach with 26 percent experiencing a breach in the last year – a number that rose from last year. Overall IT security spending is also up; in 2017 73 percent of organisations increased IT security spending – a marked jump from 2016 (58 percent).

The report, which is in its fifth year, polled 1100 senior IT security executives at enterprises around the world. Authors say it indicates a disconnect between the security organisations spend money on and the ability of those solutions to protect sensitive data. While 30 percent of respondents classify their organisations as ‘very vulnerable’ or ‘extremely vulnerable’ to data attacks (and the number of breaches continues to rise) the two top spending priorities are network (62 percent) and endpoint (56 percent) protection solutions. Counterintuitively, spending on data-at-rest solutions (46 percent) comes last.

Garrett Bekker, senior analyst, information security at 451 Research and author of the report says: “One possible explanation for this troubling state? Organisations keep spending on the same solutions that worked for them in the past but aren’t necessarily the most effective at stopping modern breaches. Data protection tactics need to evolve to match today’s threats. It stands to reason that if security strategies aren’t equally as dynamic in this fast-changing threat environment, the rate of breaches will continue to increase.”

The reasons behind security spending decisions are varied, but the key driver remains compliance. Almost half (44 percent) of respondents list meeting compliance requirements as their top spending priority, then best practices (38 percent) and protecting reputation/brand (36 percent). Fifty-nine percent also believe compliance is ‘very’ or ‘extremely’ effective at preventing data breaches. While compliance regulations provide a data security blueprint, they are by no means are the only consideration when building a security strategy robust enough to withstand today’s sophisticated attackers.

As in years past, the 2017 report explored threat perceptions. All vertical industries polled identified cyber criminals as the top threat (44 percent), followed by hacktivists (17 percent), cyberterrorists (15 percent) and nation-states (12 percent). With respect to internal threats, 58 percent of respondents believe privileged users are the most dangerous insiders (a slight decrease from last year’s 63 percent). At 44 percent, executive management is seen as the second-most-risky insider, followed by ordinary employees (36 percent) and contractors (33 percent).

In this age of the cloud and SaaS enterprise deployments, more and more enterprise data is being created, transported, processed and stored outside corporate network boundaries, making traditional perimeter-based security controls and legacy network and endpoint protection solutions increasingly less relevant. Other new, popular technologies also bring added security challenges. For example, nearly 40 percent of respondents are using Docker containers for production applications. At the same time, 47 percent cite security as the ‘top barrier’ to broader Docker container adoption.

Peter Galvin, vice president of strategy, Thales e-Security says: “Enterprises today must inevitably confront an increasingly complicated threat landscape. Our world, which now includes the cloud, big data, the IoT and Docker, calls for robust IT security strategies that protect data in all its forms, at rest, in motion and in use. Businesses need to invest in privacy-by-design defense mechanisms – such as encryption – to protect valuable data and intellectual property and view security as a business enabler that facilitates digital initiatives and builds trust between partners and customers.”

Related News

  • Cyber

    Keeping passwords safe

    by Mark Rowe

    How hard can it be? asks Ian Harvey, Software Design Authority, at the cyber product company Thales e-Security. As our reliance on…

  • Cyber

    Exposure study

    by Mark Rowe

    Organisations recognise the growing value of technology and data assets relative to historical tangible assets, though they are spending four times more…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing