Feeds

Companies getting clued up about info security

While privacy and data continue to concern

Intelligent flash storage arrays

Firms are more aware of how information security can affect business, with a rising number integrating information security with their risk management processes, according to an Ernst & Young survey.

The survey, which spoke to 1,200 information security professionals from 350 organisations in 48 countries, found some 43 per cent of the respondents integrated information security and risk management programs and processes, compared with 40 per cent in 2005.

However, this leaves more than half of the survey participants who have yet to integrate information risk management into their overall risk management activities. Furthermore, over 40 per cent of participants revealed they were not keeping the board of directors and business leaders regularly informed about information security issues.

Also causing concern was the finding that a third of those surveyed said disaster recovery timescales have not been agreed to; only half of business continuity plans have been tested; a little over half of organisations have agreed on escalation procedures for disaster responses; and less than half have developed an internal and external communication strategy for business continuity.

On the flip-side, the survey found that companies' information security policies, roles and responsibilities are reasonably well-developed, and are also being more clearly communicated to employees.

Companies are also increasingly considering information security outsourcing, driven in part by the limited availability of experienced and well-trained security staff.

Moreover, there were improvements in the area of risk assessment, with three quarters of survey respondents undertaking an IT risk assessment in developing their business continuity plans. Furthermore, almost half of information security executives claimed to have adopted, or said they plan to adopt, an information security standard.

The survey also identified five key security priorities that it considered critical to business success, highlighting privacy and personal data protection as an increasing concern for businesses.

"Among the most notable priorities is privacy and personal data protection, which is the one information security issue most consumer driven. It has become a high-stakes business issue, catapulted up the board agenda by consumer concerns, caused by well publicised lapses of security and the growing response of government and legislative activism," said Paul van Kessel, global leader of Ernst & Young's Technology and Security Risk Services.

"Understandably, it is the area where companies are being most active, with privacy and data protection practices becoming increasingly more formalised."

The other four areas of importance identified by the survey were integrating information security with the organisation; extending the impact of compliance; managing the risk of third party relationships; and designing and building information security.

"The 2006 survey, which contains a specific report based on Irish participants, demonstrates real progress in information security," said Pat Moran, partner, Risk Advisory Services, Ernst & Young.

"Largely driven from compliance and director responsibilities, I have personally observed significant corporate programmes to improve the level of information security controls and IT governance. The real trick now for organisations is to convert this mammoth compliance effort to quickly enable business ventures and investments happen in a secure and controlled way."

Copyright © 2006, ENN

Choosing a cloud hosting partner with confidence

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.