Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    IT Pros Fall Short When Protecting Their Networks, Tripwire Finds

    By
    Don Reisinger
    -
    February 15, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1IT Pros Fall Short When Protecting Their Networks, Tripwire Finds

      IT Pros Fall Short When Protecting Their Networks, Tripwire Finds

      A new survey by Tripwire finds that while IT professionals are proactive in their attempts to protect networks, they aren’t as effective as they need to be.

      2When Are Endpoint Devices Affected?

      When Are Endpoint Devices Affected?

      While Tripwire found that nearly all of the IT professionals it spoke with used automated tools to track their networks, it was surprised to discover that few knew when configuration changes were made to endpoint devices. In fact, 40 percent of respondents said that they had a “general idea” when a computer had been modified, and 17 percent had no idea. Add that to the 10 percent of respondents who don’t track networks at all, and it’s a recipe for concern.

      3Network-Linked Configuration Changes Are Another Issue

      Network-Linked Configuration Changes Are Another Issue

      Tripwire found that after an endpoint device had been reconfigured by an attacker, 40 percent of respondents wouldn’t detect the change for hours. Another 22 percent of IT professionals said it could take days to find the configuration change. By then, the endpoint has been infected and may be replicating its payload across the network.

      4Patches Don’t Always Work

      Patches Don't Always Work

      When examining health care and financial industries—two sectors that must safeguard extremely sensitive customer information—Tripwire discovered that patches don’t work nearly as well as IT professionals would like. On the health care side, just 26 percent of IT professionals said that their patches worked 90 to 100 percent of the time. Financial firms performed even worse, with just 23 percent of respondents saying they have been able to patch issues 90 to 100 percent of the time. That’s a lot of holes left unplugged.

      5Effectiveness of Vulnerability Scanning Systems Is Mixed

      Effectiveness of Vulnerability Scanning Systems Is Mixed

      In one of the few high points in the Tripwire survey, the security firm found that 38 percent of companies know for sure how long it would take for “vulnerability scanning systems” to alert them to an unauthorized device joining the network. However, 21 percent of IT professionals either don’t know how long it would take or don’t have a vulnerability scanner running on their networks that would search for unauthorized devices.

      6Government Agencies Are Slow to Fix Flaws

      Government Agencies Are Slow to Fix Flaws

      In its survey of government IT professionals, Tripwire asked how long it takes for vulnerabilities to be discovered and “promptly” patched. A whopping 15 percent of respondents said issues remain unpatched within 60 days, and a third of IT professionals said fixing the issue will take between 31 and 60 days. Approximately half of government IT professionals say they can fix vulnerabilities within 30 days.

      7Smaller Companies Are Less Effective at Controlling File Access

      Smaller Companies Are Less Effective at Controlling File Access

      Malicious users attempting to access sensitive files is obviously one of an IT professional’s chief concerns. However, just two-thirds of companies with annual revenue of $5 billion or more can detect when an unauthorized user tries to access networked files. And for smaller companies, that figure drops to 58 percent. A surprisingly large number of companies, in other words, have no idea if someone—an employee, hacker or anyone else—is gaining unauthorized access to data files.

      8Finance Industry Automation Leaves Much to Be Desired

      Finance Industry Automation Leaves Much to Be Desired

      Heading back to the finance industry, Tripwire wanted to know how much information could be obtained about unauthorized devices connecting to the network. Just 39 percent of respondents said that they could “pick up all the information necessary” to know for sure where and what the device is. Nearly 20 percent of IT professionals say that they have no way of identifying the unauthorized devices. Those companies, in other words, are flying blind with no way of knowing which devices need to be kicked from the network. Yikes.

      9Hardware Discovery Matters—but It Doesn’t Always Work

      Hardware Discovery Matters—but It Doesn't Always Work

      Controlling device access to corporate networks is a first line of defense against malicious hackers. However, just 16 percent of respondents said that they can always find out when hardware connects to the corporate network. A whopping 40 percent of IT professionals know 50 percent of the time or less when new hardware is connecting to their networks.

      10IT Professionals Lack Key Information to Prevent Hacks

      IT Professionals Lack Key Information to Prevent Hacks

      According to Tripwire, IT professionals clearly understand that they need to know what’s connecting to their networks and when. The trouble, however, is that it often takes too long to get that information, and all the while, hackers could be running amok, stealing information and crafting nasty scenarios that those IT professionals will eventually need to deal with. As Tripwire’s Director of IT Security and Risk Strategy Tim Erlin notes, the study shows “IT managers and executives … are missing key information that’s necessary to defend themselves against cyber attacks.”

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×