iTnews
  • Home
  • News
  • Technology
  • Security

Security professionals aim to end data breaches

By Phil Muncaster on Apr 28, 2008 11:58AM

Preventing data breaches is the highest priority for today’s IT security professionals, two new surveys have concluded.

But delegates at the Infosecurity Europe show in London last week were divided on the most effective method for securing data – and protecting corporate reputations.

The Department for Business Enterprise and Regulatory Reform (Berr’s) biennial security survey showed 77 percent of firms now regard protecting customer information as a priority. Yet only eight per cent of those polled encrypt data stored on laptops.

Meanwhile, in an ISC2 Global Information Security Workforce Study of more than 7,500 security professionals, avoiding damage to reputation was a priority for 71 percent of respondents. A further 70 percent said protecting customer data was a priority, while 61 per cent said the risk of breaching laws and regulations was a driver for information security governance.

But the disparity between firms’ security intentions and their actions persists, argued Chris Potter, a partner at PricewaterhouseCoopers. “There are gaps between the aspirations of companies and what they are actually putting into practice,” he added.

The lack of dedicated IT security professionals and the ever-evolving nature of threats are major factors adding to the risks that firms face today, argued Potter. Companies should step up their risk assessment programmes, he advised.

But Information Commissioner Richard Thomas, told delegates he believed firms’ reluctance to take data protection seriously would persist until stronger penalties were enforced. He noted that while high-profile cases such as the loss of millions of personal records by HM Revenue & Customs had raised awareness, the attitude of the public sector towards data protection remained “worrying”.

Thomas said he was frustrated that powers to imprison those convicted of il legally trading information had yet to be fully enacted. “I’m still seeking serious deterrents to those who engage in this illegal market,” he advised.

Further evidence of government heel-dragging was perceptible in one of the big holes in the show agenda. The Police Central E-crime unit had been expected to be operational in time to unveil its new e-crime reporting portal at the show. But a spokeswoman for the Association of Police Officers confirmed that launch plans have been pushed back.

Some security experts believe that business leaders will not take data loss prevention seriously until they are compelled to inform customers of any breach.

Howard Schmidt, director at security company Fortify, and one-time security adviser to the White House, insisted that breach notification laws had been largely successful where they had been introduced.

“Breach notifications would be of benefit to anyone. But when you have the requirement to do so, it must be consistent. In the US, states make their own [laws] and there is a lot of complexity. This makes it difficult to manage,” he suggested.

Meanwhile, other security experts bemoaned the general level of organisational security awareness.

“What we find is that we may have got the technical problems solved but we need to raise the human element,” said Martin Smith of The Security Company.

Although firms are trusting their staff more by reducing blocks on instant messaging and opening up internet access, training policies still lack vigour, the Berr report found.

But Mike Smart of security vendor Secure Computing argued that technology controls are an important part of an effective security risk management programme. “Policy-based actions, like encrypting content, become very important and technology can help to stop users clicking on a certain link, to [mitigate the risk] from social engineering attacks,” Smart explained.
Got a news tip for our journalists? Share it with us anonymously here.
itweek.co.uk @ 2010 Incisive Media
Tags:
aimbreachesdataendprofessionalssecurityto

Partner Content

How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Phil Muncaster
Apr 28 2008
11:58AM
0 Comments

Related Articles

  • Qld gov proposes mandatory data breach reporting for agencies
  • Law firm mulls class action over NDIS software provider data breach
  • NDIS case management system provider breached
  • 50k customers caught up in Spirit Super phishing attack
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

NSW Police scores $100m to connect body-cams to firearms, tasers

NSW Police scores $100m to connect body-cams to firearms, tasers

Digital Nation

Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
The security threat of quantum computing
The security threat of quantum computing
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.