Security Policies: How Much Is Enough? - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Security Policies: How Much Is Enough?

Keeping networks free of unsavory content or activities is a priority for nearly two-thirds of the 4,500 global security professionals in the InformationWeek Research Global Information Security Survey, fielded by PricewaterhouseCoopers. There's a good reason for this: As more workers connect to the Internet, companies need to be sure employees aren't needlessly surfing or visiting porn sites on company time.

But companies need to do more to bolster their defenses. A surprisingly low number include data protection (60%), user awareness (55%), or monitoring standards (33%) as part of their information security policy. About one-third of companies polled don't conduct risk analysis or classify their information.

"Not knowing what corporate information is worth, or examining the risk of the information being compromised, makes it pretty hard to determine what changes need to be made to protect data or how much to spend protecting it," says Frank Prince, a security analyst with Forrester Research.

Recent history shows how dangerous the lack of a user-awareness program in a security policy can be to the health of networks and systems. Millions of Sircam viruses have spread throughout the Internet, clogging E-mail gateways, largely because workers may have been less than careful clicking on an attachment. Also, security firm TruSecure estimates there have been more than 500,000 internal Code Red infections.

What's your company doing to alert employees to possible security breaches?

George V. Hulme
Senior Editor
[email protected]



Keep It Simple
Which access tools are companies in this year's Global Information Security Survey using to protect information systems? Overwhelmingly, they're relying on basic but not technically advanced solutions. The most frequent method of protection used is basic user passwords--94% of companies say this is their access tool of choice. Less popular are multiple logons and passwords; less than 60% of security professionals report that their companies deploy this technique.

One in four companies favors minicomputer or mainframe access-control software, terminal key locks or lock words, or single sign-on software. But few companies are looking to one-time passwords or biometrics as access tools to protect their systems.

Top of the Page


We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
Reflections on Tech in 2019
James M. Connolly, Editorial Director, InformationWeek and Network Computing,  12/9/2019
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll