Wednesday, June 1, 2016

Security practices are not adapting to quick changes in IT strategy

Healthcare agencies and other companies require changing security approaches as their agencies pursue changes in IT strategies and operations, in accordance to results of recent research.

Slightly more than half of the 500 security experts stated that their organizations have altered security approaches based on changes in IT operations, like depending on more cloud-based solutions or making wider use of mobile devices and apps.

Although, the study also discovered that 43% of respondents prioritize other technology requirements in their companies over security.

The Practices of Security Professionals study was taken by CompTIA, a not-for-profit association for the technology industry.

“Far more than half of all industries have adopted cloud computing and mobile devices,” stated Seth Robinson, senior director, technology analysis at CompTIA. Results of the survey “recommend that several companies are embracing new technology solutions without taking the corresponding actions essential to build a proper defense. This poses huge challenges for the IT security professionals tasked with security responsibilities.”

IT security professionals confront several challenges, CompTIA said in its analysis. Slightly less than half of respondents (47%) say there is a belief within their agency that existing security is “good enough.” Four in 10 cite a lack of security metrics, while a slightly smaller percentage (37%) point to a deficiency of budget dedicated to security.

A majority (90%) of IT professionals say security is of greater significance today to their companies than it was 2 years ago. While some improvements in security have been noted, many companies require improving their standing, CompTIA asserts.

“Simply placing a higher priority on security might not lead to improved measures,” Robinson said. “Companies may not completely understand the nature of modern threats. It is incumbent on the IT pros to adequately communicate the needs for modern security, the potential cost of weak defenses and the specific actions that should be taken.”

 

 

No comments:

Post a Comment