CSO - The 2009 Security Mega Trends Survey was conducted by Ponemon Institute and sponsored by Lumension Security Inc. to better understand if certain publicized IT risks to personal and confidential data are, or should be, more or less of a concern for companies. We asked 577 IT security practitioners to consider how 10 security megatrends affect companies today and to predict their impact during the next 12 to 24 months. The opinions of these experts, we believe, will be helpful to companies that are struggling to understand how they should allocate resources to the protection of data during these difficult economic times.
We selected the following megatrends for this study based on input from a panel of experts in IT security. They are cloud computing, virtualization, mobility and mobile devices, cybercrime, outsourcing to third parties, data breaches and the risk of identity theft, peer-to-peer file sharing, and Web 2.0.
The study examined the risks posed by megatrends that exist today and how the risk will change over the next 12 to 24 months. According to an overwhelming 77% of experts in IT security responding to our survey, cybercrime will become a "high" or "very high" risk over the next 12 to 24 months.
The selection of cybercrime as the megatrend most likely to be a high or very high risk in the next 12 to 24 months can be partly based on the fact that 92% of respondents to our study reported that their companies have experienced a cyberattack. The biggest security risk associated with cybercrime is that such an attack will cause a business interruption followed by the theft of customer and employee data.
Other megatrends becoming more risky are cloud computing, malware, Web 2.0 and mobile devices. In the case of cloud computing, it is the inability to assess or verify the security of data centers in the cloud and protect sensitive and confidential information. IT security practitioners see the risk of malware and Web 2.0 as resulting in the loss of sensitive or confidential business information including trade secrets.
It is interesting to note that in our study, IT security respondents perceive the risk of a mobile workforce as decreasing but mobile devices remaining a high or very high risk for many companies. According to respondents, the most risky mobile device is the laptop computer, and the No. 1 concern is the inability to properly identify and authenticate remote users.
Data Breaches and Outsourcing Risks Continue
Data breaches and outsourcing are forecast to remain at the same level of risk. IT security practitioners continue to worry about data breaches because, according to our study, only 16% are very confident or confident that current security practices are able to prevent customer and employee data from being lost or stolen. Therefore, it is understandable why the majority of respondents in IT security believe that data breaches will continue to pose a high and very high security threat to their organizations.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- 10 Things Your Next Firewall Must do Next-Generation Firewalls Defined
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva.