Vulnerabilities / Threats

7/24/2017
10:36 AM
100%
0%

Majority of Security Pros Let Productivity Trump Security

A survey found that 64% of IT security professionals will tweak security to give workers more flexibility to be productive when asked to make that move by top executives.

Tension between the IT security department and workers' desire to remain as productive as possible continues to thrive, according to a report released today by Bromium.

The survey of 175 security professionals found that 64% of respondents admit to lowering the security bar when asked by top executives to allow workers the flexibility to remain productive.

These results reveal that it's not necessarily the IT security department that is calling the shots when it comes to protecting customer data, the network, and people's IP, according to the report. Often, these security professionals are trumped by their company's leadership, the survey notes.

"Whenever an organization adopts a security policy, we are surprised how many will break it," says Simon Crosby, CTO and co-founder of Bromium.

The willingness to lower the security bar tends to mirror the natural human instinct when it comes to assessing risk, Crosby explains. He compares it to driving to a neighborhood store to get a carton of milk and debating whether to wear a seatbelt. The discussion inside the driver's mind would rationalize that there is a risk of getting hit but that risk is small, he notes.

"The security guys may also say the risk is tiny when evaluating the request. But it is this repeated risk-taking that opens up tiny holes and leads to a porous security situation," Crosby says.

He adds that once a security professional grants an exception to a security policy, they may forget to return it to its more secure state once the need to lower the bar has passed.

Hitting the Security Off Button

The survey also found that 40% of IT infosec professionals are willing to turn off security if asked by another department within the organization.

"I am not surprised by the 40%. We need to be productive but need to do it without sacrificing security," Crosby says. "We are happy to lie to ourselves and think we are securing the organization when we have these policies that we know workers will break."

In addition to a willingness to turn security off if another department asks, the survey also finds that 55% of respondents would remove security features if they could do it, and still maintain their organization's safety from user-introduced threats.

On the wish list of security features they would like to remove, 32% of infosec professionsal respondents cite web proxy services and products that limit or slow down users' access as the first on the list, according to the report.

"In general, people will turn off the web proxy if it impacts user productivity and it gets them off their backs," says Crosby. "Security teams rely on defense in depth and tell themselves I have antivirus at the endpoint and all these other things to protect me. It makes sense to turn things off and it's imperative to do so."

Alternatives to Hitting the Off Switch

One approach to securing an organization is building resilience into the system, Crosby says.

"There needs to be granular isolation between the apps and the OS, and also between the apps themselves," he notes. "The administered systems will fail at some point but you want them to be able to continue to operate, so you need to build resiliency into the system."

He compared this approach to Netflix's use of a Byzantine Fault Tolerance system in which rather than having its operations on one big mainframe which could fail, it operates on a distributed architecture on a number of micro severs. As a result, a portion of the business could fail but it would still be able to operate.

"You can do this in the cloud and you can do this at the endpoint," he notes.

Related Content:

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ArriusMC
50%
50%
ArriusMC,
User Rank: Apprentice
7/26/2017 | 9:51:52 AM
Interesting Topic
Definitely an interesting topic. But an excellent article nonetheless. It was a great read, keep up the good work. 

 
matisstar
100%
0%
matisstar,
User Rank: Apprentice
7/26/2017 | 3:28:32 AM
Re:
One of the best post I have ever read. Thank you for sharing!
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
7/25/2017 | 10:23:50 AM
Micros services
 

"... it operates on a distributed architecture on a number of micro severs. As a result, a portion of the business could fail but it would still be able to operate. "

I agree. When it comes to secure software development I would say micros services would help us better to get control of security vulnerabilities.
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
7/25/2017 | 10:21:32 AM
Security and Productivity
 

"In general, people will turn off the web proxy if it impacts user productivity and it gets them off their backs,"

Interesting, I still think we can find a way to be productive and be secure at the same time
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
7/25/2017 | 10:21:03 AM
Re: Quantity vs quality
"The 'Boss' can see the numbers of productivity better than the esoterics of quality, security and continuity."

I hear you. That is part of the business I would say. We can be all secure but not productive that business will not be around much so the security of that.
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
7/25/2017 | 10:19:38 AM
Re: Quantity vs quality
"THis happens in most, if not all, forms of human industry."

That makes sense, bosses are bosses everywhere obviously.
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
7/25/2017 | 10:14:21 AM
Security vs. Productivity
 

"The survey of 175 security professionals found that 64% of respondents admit to lowering the security bar when asked by top executives to allow workers the flexibility to remain productive."

I am not surprised by this, at the end of the day if productivity is not there security could not be sustained.
Tron70
50%
50%
Tron70,
User Rank: Apprentice
7/24/2017 | 1:36:56 PM
Quantity vs quality
THis happens in most, if not all, forms of human industry. Manufacturing, Retail, Medicine, Education, and, yes, even NetSec/SysAdmin....This is why, in America, most of these endeavors suffer and the skill of the labor force is weakened...The 'Boss' can see the numbers of productivity better than the esoterics of quality, security and continuity...hopefully we will learn to see the whole AND the sum of it's parts before the whole thing blows up in our face..
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.