January 8, 2010 By Hilton Collins
It's no secret that security pros worry about cyber-attacks that can happen anytime in a networked world, but apparently, they also worry about how much end-users know about good computer hygiene and their organizations' abilities to assess how secure they are - or aren't.
The Computer Security Institute (CSI), which holds conferences and educational events for IT workers, released the 14th edition of its annual CSI Computer Crime and Security Survey in December 2009, with an assessment of how respondents felt about their own cyber-security situations and what that assessment may mean for 2010. The institute partnered with General Dynamics Advanced Information Systems to glean insight from 443 U.S.-based respondents across the public and private sectors.
The institute asked respondents to rate how satisfied they were with their technologies on a scale of 1 to 5. All technologies fell within the 3.0 to 3.6 range, which isn't bad, but the tools that scored the lowest in that zone were the ones that are supposed to indicate how secure an organization is at any given moment.
"They weren't wildly happy with anything nor, on the other hand, were they wildly unhappy with anything, but it sort of indicates to me that there's an acceptance of the tools we have," said Robert Richardson, CSI's director.
But he also said the respondents don't feel like they have a comprehensive solution tool for monitoring. The tools mentioned in the survey overview included log management tools, data leak prevention, content monitoring and intrusion detection tools.
"I think, as an industry, we are struggling with measuring and monitoring what's going on," Richardson said. "If you ask me what people are going to be focusing on in 2010, I think one of the things is how to extract meaning from all of the log information or the auditing information that's sitting out there in the enterprise, government agency or wherever."
But respondents also expressed even greater concern over a perceived lack of proper security awareness training for users at endpoints. A whopping 43.4 percent of them said that less than 1 percent of their security budget was allocated to awareness training, and 55 percent said current investments in this area were inadequate.
"I think that's too bad it is that way, but consider that you could cut half of the losses simply by taking care of that problem," Richardson said.
Twenty-five percent of respondents said more than 60 percent of financial losses came from accidental breaches by insiders, not external hacks, and 16.1 percent said 81 to 100 percent of all losses came from accidental breaches as well.
The CSI figures included other cyber-security data as well about the occurrence of threats in 2009 compared to those in 2008:
Richardson said governments should pay special attention to security because they're more visible as targets for cyber-attacks. Government agencies constituted more than 13 percent of survey participants, comprising people from federal, local, military and law enforcement jurisdictions.
CSI sent the survey questionnaire to 6,100 CSI members, those who've joined and those who've attended live events and webcasts. Richardson thought the results were telling, but he wondered about the experiences of those who didn't respond.
"There's an enormous amount of discomfort around what happens when you have a really serious incident. There are, relative to the number of organizations in the world or in the United States, few headline-making total disaster breaches, but if it happens to you, it can be devastating," he said, and doubted the pool of the 443 respondents was large enough to capture many serious victims.
"If the company is seriously damaged by that kind of incident, my suspicion is they don't answer the survey," Richardson said.
This Digital Communities white paper highlights discussions with IT officials in four counties that have adopted shared services models. Our aim was to learn about the obstacles these governments have faced when it comes to shared services and what it takes to overcome those roadblocks. We also spoke with several members of the IT industry who have thought long and hard about these issues. The paper offers some best practices for shared government-to-government services, but also points out challenges that government and industry still must overcome before this model gains widespread adoption.