Feeds

We're winning the war against hackers

Security pros are cooking on gas

The Essential Guide to IT Transformation

Despite the apparent growth in security incidents and hacker attacks over recent years, a clear majority (72 per cent) of UK security professionals feel their organisation is more secure than it was 12 months ago.

Organisations are no longer on the back foot in the fight against security threats, with only 11 per cent of respondents in a survey of 100 chief security officers (CSOs) and IT directors saying they take a 'reactive only' approach to security.

More firms are putting in place contingency plans to ensure they can continue to operate in spite of evolving digital and physical threats, the Cisco-sponsored poll found. Survey respondents have contingency plans in place for power failure (96 per cent), fire (95 per cent), loss of data (93 per cent), physical access to buildings (86 per cent), and flooding (80 per cent).

IT pros have long complained that management frequently fails to understand the importance of their work. This may be changing, as the survey, which was conducted by market research outfit Vanson Borne on behalf of Cisco, found that only 23 per cent of respondents felt that security is still not recognised as a boardroom level issue.

Firms are also making progress in educating staff on security issues. The majority of respondents have extensive IT security training in place, such as acceptable usage policies (92 per cent), email usage policies (85 per cent), password policies (81 per cent), and training in the need for backups (59 per cent).

"It is very encouraging to see that, despite ongoing reports of new threats and breaches, businesses across all sectors are feeling better protected," Cisco Systems senior security advisor Paul King said.

"Businesses have recognised the importance of implementing comprehensive security strategies and are beginning to anticipate what might be around the corner." ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.