Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Research: Is Your Security Comfort Level Too High? – 2

    Written by

    Allan Alter
    Published August 8, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The results of this months research are available in Adobe Acrobat PDF format. (To download the free Adobe Acrobat Reader plug-in, click here.)

      • Is Your Security Comfort Level Too High?

      90.2% of CIOs say their domestic security measures are adequate
      82.2 % of IT executives say their companies have an information security policy
      28.4% of companies do not have a security officer
      43.7% of IT executives expect their companies security spending to increase
      40.2% have cancelled plans to increase security due to user complaints

      The vast majority of the more than 600 IT executives polled for this months CIO Insight survey on security management say their domestic security preparations in the face of threats to their information systems are adequate. And yet more than 40 percent expect their spending on IT security to rise.

      Meanwhile, the results of the survey suggest that the level of concern with security generally has dropped since Sept. 11—the percentage of companies with information security and business continuity plans has not increased since a year ago, for instance—its still hovering at about 80 percent and 75 percent, respectively.

      Yet IT executives still complain about the difficulty of educating employees about security and enforcing security policy. Whats wrong with this picture? It may simply be that most companies have adequately prepared for the security threats that matter to them most, and that the additional spending will bring little added value. Or it may be that they are living in a dream world, and that the threat is real, and really increasing. Sadly, only time will tell.

      Analysis

      : Why Is It So Difficult?”>

      Why Is It So Difficult to Educate or Enforce Compliance?

      Does this sound familiar? Ian Fleming is his companys top IT executive and a passionate believer in strict security procedures. But convincing other executives at his company, an electric utility that he requested not be named, has been a struggle. On several occasions, Fleming says, hes been chastised by other executives for insisting they follow simple security procedures such as changing their passwords. And in December, Fleming found himself arguing with the CEO, who insisted on choosing a permanent password for himself. While the CEO now supports the security policy, says Fleming, “most managers in the utility industry see security as an obstacle to performing everyday business.”

      Judging by the results of our latest survey, Fleming has plenty of company both inside and outside his industry. Less than 10 percent of IT executives feel their companies security is less than adequate. But ask them about enforcing security policy and educating employees about security, and the level of confidence drops considerably. Thirty-four percent feel they are doing a less than excellent job of enforcing their security policies, while 45 percent miss the mark when it comes to education.

      Given the attention directed to computer viruses, hackers and terrorism, why is managing security so tough? No surprise here; according to the IT executives we spoke with, user resistance and denial are at the root of the problem. No one has a sure-fire solution. Instead, they count on practices that seem to, or they hope will, work somewhat better than others.

      Users regard security policies as an inconvenience, even a nuisance. “Security makes it harder for people to use the infrastructure we have built,” says Vijay Sharma, a vice president of relationship management at Sodexho USA, a food and facilities-management company. Until people begin to doubt the integrity of the data or the systems, users think security “is more or less an annoyance,” he says. That leads employees, and even managers, to ignore policies and known risks.

      IT executives also say they often run into a “cant happen here” or “cant happen to me” attitude. Employees and managers may feel their industry isnt likely to be a target for hackers. Others think they know enough about computers to safely disregard company policies, so they download software off the Web, install their own programs or even change the configuration of their computers in order to speed them up—leaving themselves and their networks open to viruses, intruders and system crashes. Randy Kjell, VP of IT of Knowles Electronics Inc., a manufacturer in Itasca, Ill., sees this attitude among his companys engineers. “They think other people are the problem, not them. They think their stuff wont hurt the company, so even after educating them, the user community does not agree that these are truly high security issues.”

      How do CIOs overcome these attitudes? One way is to make the system— not users—do the work of maintaining security, so that education and enforcement become moot. Executives like Kjell are putting intrusion detection, spam managers and virus filters on the network or firewall, out of sight and reach. And while Fleming is willing to isolate the engineering department if employees there engage in risky behavior, other CIOs simply show users safe ways to do what they want to do without endangering the companys network. “Ive said no, but heres a way to get the results you want that minimizes our risk,” says George Brenckle, CIO of the University of Pennsylvania Health System in Philadelphia.

      The CIOs we spoke to use newsletters, intranets, e-mails and meetings to educate employees, but none works, they admit, as well as talking with employees after theyve damaged their computers. “They tend to learn their lesson when their machines dont work for a period of time,” says Kjell. Otherwise, it isnt the technique that matters as much as how often they contact employees about security, and finding a way that means something to users. Sharma, an ex-college food service director, stresses the importance of meeting with employees and explaining the need for security on their terms. For example, at a meeting with a team working on an e-business project, Sharma discussed recent articles about security problems. “If companies like Microsoft can be compromised, what makes you think we cant be?” he asked. The team then discussed how Sodexhos business would be hurt if security problems caused customers to lose trust in the company.

      The only potential breakthrough anyone cited is in the healthcare industry, where new HIPAA regulations require companies to train and test staff on privacy and security policies. In January, Penn Healths Brenckle began to use Web-based training to teach, test, record results and provide yearly refresher courses on HIPAA privacy. His staff is now putting together a similar program for security.

      Still, the only way to solve the security problem is to make it a non-issue by designing systems so that they place no demands on users. Until that goal is reached, the problem of user resistance, deeply rooted in human nature, will remain a tough nut to crack.

      Allan Alter
      Allan Alter
      Executive EditorAllan Alter has been a specialist on information technology management, strategy and leadership for many years. Most recently, he was editor-in-chief and the director of new content development for the MIT Sloan Management Review. He has been a columnist and department editor at Computerworld, where he won three awards from the American Society of Business Press Editors. Previously he was a special projects editor, senior editor and senior writer for CIO magazine. Earlier, Alter was an associate editor for Mass High Tech. He has edited two books: The Squandered Computer: Evaluating the Business Alignment of Business Technologies and Redesigning the Firm.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.