Security Policies: How Much Is Enough? - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Security Policies: How Much Is Enough?

Keeping networks free of unsavory content or activities is a priority for nearly two-thirds of the 4,500 global security professionals in the InformationWeek Research Global Information Security Survey, fielded by PricewaterhouseCoopers. There's a good reason for this: As more workers connect to the Internet, companies need to be sure employees aren't needlessly surfing or visiting porn sites on company time.

But companies need to do more to bolster their defenses. A surprisingly low number include data protection (60%), user awareness (55%), or monitoring standards (33%) as part of their information security policy. About one-third of companies polled don't conduct risk analysis or classify their information.

"Not knowing what corporate information is worth, or examining the risk of the information being compromised, makes it pretty hard to determine what changes need to be made to protect data or how much to spend protecting it," says Frank Prince, a security analyst with Forrester Research.

Recent history shows how dangerous the lack of a user-awareness program in a security policy can be to the health of networks and systems. Millions of Sircam viruses have spread throughout the Internet, clogging E-mail gateways, largely because workers may have been less than careful clicking on an attachment. Also, security firm TruSecure estimates there have been more than 500,000 internal Code Red infections.

What's your company doing to alert employees to possible security breaches?

George V. Hulme
Senior Editor
[email protected]



Keep It Simple
Which access tools are companies in this year's Global Information Security Survey using to protect information systems? Overwhelmingly, they're relying on basic but not technically advanced solutions. The most frequent method of protection used is basic user passwords--94% of companies say this is their access tool of choice. Less popular are multiple logons and passwords; less than 60% of security professionals report that their companies deploy this technique.

One in four companies favors minicomputer or mainframe access-control software, terminal key locks or lock words, or single sign-on software. But few companies are looking to one-time passwords or biometrics as access tools to protect their systems.

Top of the Page


We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Slideshows
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
News
Time to Shift Your Job Search Out of Neutral
Jessica Davis, Senior Editor, Enterprise Apps,  3/31/2021
Commentary
Does Identity Hinder Hybrid-Cloud and Multi-Cloud Adoption?
Joao-Pierre S. Ruth, Senior Writer,  4/1/2021
Register for InformationWeek Newsletters
Video
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll