SlideShare una empresa de Scribd logo
1 de 9
@StoretecHull

www.storetec.net

Facebook.com/storetec
Storetec Services Limited

Cyber Security Response 'Could Make
Companies More Vulnerable'
Many companies are taking new steps in an attempt to make their data
and IT systems more secure, but they might actually have the opposite
effect.
This is the view of Gartner's 2013 Global Risk Management Strategy,
which claims that the fear of more advanced forms of cyber attack is
causing companies to move away from well-established security
measures like enterprise risk management and risk-based information
security.
Instead of using such methods, they are instead seeking to use
technical security, a survey by Gartner of 555 organisations in the UK,
US, Canada and Germany showed. The proportion of organisations
using enterprise risk management halved from 12 per cent to six per
cent.
However, Gartner argues, this actually makes them more vulnerable to
emerging threats, suggesting that the FUD (fear, uncertainty and doubt)
trap is snaring a growing number of enterprises.
Research director at Gartner John Wheeler commented: "While the
shift to strengthening technical security controls is not surprising, given
the hype around cyberattacks and data security breaches, strong riskbased disciplines, such as enterprise risk management or risk-based
information security, are rooted in proactive, data-driven decision
making.
"These disciplines focus squarely on the uncertainty risk as well as the
methods or controls to reduce it. By doing so, the associated fear and
doubt are subsequently eliminated."
He argued that this will mean that companies will cease to be vigilant
towards risk-based threats and therefore be more prone to falling victim
to them. The result of this will be an eventual shift back to risk-based
strategies when firms realise their benefits, but by then many will have
suffered the consequences of the change.
One positive impact of the FUD factor suggested by the report is that
concerned companies will raise their levels of IT security investment
and staffing. In the survey, 39 per cent of firms revealed they had
dedicated over seven per cent of their IT budget to security in 2013,
compared with only 23 per cent last year.
However, the survey found, there was no guarantee that such budgets
will be maintained in the future, while the proportion of companies
handling IT risk through management committees fell year-on-year
from 53 per cent to 39 per cent.
"These incongruent survey findings seem to validate the observation
that risk-based, data-driven approaches are falling to the wayside in
favor of FUD-based, emotion-driven activities," Mr Wheeler
commented.
"Or, perhaps more disturbingly, they indicate that those who have
concerns are simply burying their head in the sand, rather than
proactively addressing emerging threats," he added.

For companies concerned about their information security, there is an
alternative approach. Rather than worry about throwing lots of money
at such issues in this year's budget but not in 2014-15, how much
management input (or expertise) there is, or whether the overall
approach to risk and cyber threats is the right one, a sensible approach
may be to use the services of a remote host who can store data safely,
securely and remotely.
By doing this the issues can be outsourced to dedicated professionals
who can identify risks, know the latest means of tackling threats, just
what those dangers are and what the most appropriate response is.
In the case of the UK, the need to do this may be considerable. The
Gartner report suggests that companies may lose out by changing the
way they seek to deal with IT security matters. However, for some the
problem is worse still – a lack of any kind of concerted approach
towards cyber threats and thus a high level of vulnerability.
This was the conclusion of Ernst & Young's Global Information Security
Survey 2013, published last week, which found 66 per cent of senior
company executives reported the number of cyber attacks on their
firms had jumped by five per cent or more in the past year.
Perhaps the most alarming finding of the survey was that only four per
cent of those polled said they believed their in-house security systems
were robust enough to ward off such attacks.

Information security director for Ernst & Young Mark Brown said
companies need to face the reality that it is a question of when they will
be targeted, not if.
Storetec News/Blogs."http://www.storetec.net/news-blog/cybersecurity-response-could-make-companies-more-vulnerable/".
Cyber Security Response 'Could Make Companies More
Vulnerable'. November 8, 2013. Storetec.

Más contenido relacionado

Destacado

The power and limitation of leadership and organisational metaphors
The power and limitation of leadership and organisational metaphorsThe power and limitation of leadership and organisational metaphors
The power and limitation of leadership and organisational metaphorsOlaojo Aiyegbayo
 
Value of remote working emphasised by new great storm
Value of remote working emphasised by new great stormValue of remote working emphasised by new great storm
Value of remote working emphasised by new great stormJohn Davis
 
PERFIL DEL ESTUDIANTE - UNIVERSITARIO
PERFIL DEL ESTUDIANTE - UNIVERSITARIOPERFIL DEL ESTUDIANTE - UNIVERSITARIO
PERFIL DEL ESTUDIANTE - UNIVERSITARIOSiré B.
 
IKRA Creative Agency Presentation (ENG)
IKRA Creative Agency Presentation (ENG)IKRA Creative Agency Presentation (ENG)
IKRA Creative Agency Presentation (ENG)IKRA Creative agency
 
Distrito 1 guadalajara D1 sd01-consulta2011
Distrito 1 guadalajara D1 sd01-consulta2011Distrito 1 guadalajara D1 sd01-consulta2011
Distrito 1 guadalajara D1 sd01-consulta2011Mario Mendoza
 
Barrukodinamika
BarrukodinamikaBarrukodinamika
Barrukodinamikasonri15
 
data science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecturedata science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecturechris wiggins
 

Destacado (8)

The power and limitation of leadership and organisational metaphors
The power and limitation of leadership and organisational metaphorsThe power and limitation of leadership and organisational metaphors
The power and limitation of leadership and organisational metaphors
 
Value of remote working emphasised by new great storm
Value of remote working emphasised by new great stormValue of remote working emphasised by new great storm
Value of remote working emphasised by new great storm
 
Revolt of 1857
Revolt of 1857Revolt of 1857
Revolt of 1857
 
PERFIL DEL ESTUDIANTE - UNIVERSITARIO
PERFIL DEL ESTUDIANTE - UNIVERSITARIOPERFIL DEL ESTUDIANTE - UNIVERSITARIO
PERFIL DEL ESTUDIANTE - UNIVERSITARIO
 
IKRA Creative Agency Presentation (ENG)
IKRA Creative Agency Presentation (ENG)IKRA Creative Agency Presentation (ENG)
IKRA Creative Agency Presentation (ENG)
 
Distrito 1 guadalajara D1 sd01-consulta2011
Distrito 1 guadalajara D1 sd01-consulta2011Distrito 1 guadalajara D1 sd01-consulta2011
Distrito 1 guadalajara D1 sd01-consulta2011
 
Barrukodinamika
BarrukodinamikaBarrukodinamika
Barrukodinamika
 
data science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecturedata science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecture
 

Más de John Davis

Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network John Davis
 
Data protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearData protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearJohn Davis
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataJohn Davis
 
Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacksJohn Davis
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryJohn Davis
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data riskJohn Davis
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsJohn Davis
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problemJohn Davis
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’John Davis
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firmsJohn Davis
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’John Davis
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionJohn Davis
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’John Davis
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’John Davis
 
Data security breach may embarrass fa
Data security breach may embarrass faData security breach may embarrass fa
Data security breach may embarrass faJohn Davis
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsJohn Davis
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’John Davis
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say expertsJohn Davis
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeJohn Davis
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacksJohn Davis
 

Más de John Davis (20)

Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network
 
Data protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearData protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a year
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacks
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recovery
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data risk
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concerns
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problem
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firms
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 million
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’
 
Data security breach may embarrass fa
Data security breach may embarrass faData security breach may embarrass fa
Data security breach may embarrass fa
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegations
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say experts
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Cyber security response 'could make companies more vulnerable'

  • 1. @StoretecHull www.storetec.net Facebook.com/storetec Storetec Services Limited Cyber Security Response 'Could Make Companies More Vulnerable' Many companies are taking new steps in an attempt to make their data and IT systems more secure, but they might actually have the opposite effect. This is the view of Gartner's 2013 Global Risk Management Strategy, which claims that the fear of more advanced forms of cyber attack is causing companies to move away from well-established security measures like enterprise risk management and risk-based information security.
  • 2. Instead of using such methods, they are instead seeking to use technical security, a survey by Gartner of 555 organisations in the UK, US, Canada and Germany showed. The proportion of organisations using enterprise risk management halved from 12 per cent to six per cent. However, Gartner argues, this actually makes them more vulnerable to emerging threats, suggesting that the FUD (fear, uncertainty and doubt) trap is snaring a growing number of enterprises.
  • 3. Research director at Gartner John Wheeler commented: "While the shift to strengthening technical security controls is not surprising, given the hype around cyberattacks and data security breaches, strong riskbased disciplines, such as enterprise risk management or risk-based information security, are rooted in proactive, data-driven decision making. "These disciplines focus squarely on the uncertainty risk as well as the methods or controls to reduce it. By doing so, the associated fear and doubt are subsequently eliminated."
  • 4. He argued that this will mean that companies will cease to be vigilant towards risk-based threats and therefore be more prone to falling victim to them. The result of this will be an eventual shift back to risk-based strategies when firms realise their benefits, but by then many will have suffered the consequences of the change. One positive impact of the FUD factor suggested by the report is that concerned companies will raise their levels of IT security investment and staffing. In the survey, 39 per cent of firms revealed they had dedicated over seven per cent of their IT budget to security in 2013, compared with only 23 per cent last year.
  • 5. However, the survey found, there was no guarantee that such budgets will be maintained in the future, while the proportion of companies handling IT risk through management committees fell year-on-year from 53 per cent to 39 per cent. "These incongruent survey findings seem to validate the observation that risk-based, data-driven approaches are falling to the wayside in favor of FUD-based, emotion-driven activities," Mr Wheeler commented.
  • 6. "Or, perhaps more disturbingly, they indicate that those who have concerns are simply burying their head in the sand, rather than proactively addressing emerging threats," he added. For companies concerned about their information security, there is an alternative approach. Rather than worry about throwing lots of money at such issues in this year's budget but not in 2014-15, how much management input (or expertise) there is, or whether the overall approach to risk and cyber threats is the right one, a sensible approach may be to use the services of a remote host who can store data safely, securely and remotely.
  • 7. By doing this the issues can be outsourced to dedicated professionals who can identify risks, know the latest means of tackling threats, just what those dangers are and what the most appropriate response is. In the case of the UK, the need to do this may be considerable. The Gartner report suggests that companies may lose out by changing the way they seek to deal with IT security matters. However, for some the problem is worse still – a lack of any kind of concerted approach towards cyber threats and thus a high level of vulnerability.
  • 8. This was the conclusion of Ernst & Young's Global Information Security Survey 2013, published last week, which found 66 per cent of senior company executives reported the number of cyber attacks on their firms had jumped by five per cent or more in the past year. Perhaps the most alarming finding of the survey was that only four per cent of those polled said they believed their in-house security systems were robust enough to ward off such attacks. Information security director for Ernst & Young Mark Brown said companies need to face the reality that it is a question of when they will be targeted, not if.