Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

8/22/2008
01:55 AM
50%
50%

Survey: Mid-Sized Firms Shape Up for Security

Security outweighs cost reduction as firms' biggest concern

By James Rogers, August 22, 2008, 9:55 AM

Most mid-sized U.S. firms rate information security as a higher priority than reducing business costs, according to research released this week by services specialist Arrow Electronics Inc.

The survey of 200 U.S. companies revealed that almost 80 percent of firms rate security as a top business issue, compared to 69 percent who cited ‘cost reduction,’ and 64 percent who listed improving customer service as their major concern.

Companies surveyed by Arrow had annual revenues ranging from less than $100 million to over $1 billion.

“These findings affirm what we’re hearing from our business partners who are on the front lines with midmarket companies, the fastest growing sector of the economy,” said Mark Taylor, general manager of Arrow’s midmarket group in a statement released yesterday. “Information Security offerings are a top priority.”

These sentiments were echoed by the IT user community.

“I think that when it comes to losing data because of viruses, hackers, or other threats, that definitely is a top concern, and I would agree with the Arrow survey, [security] outweighs cost concern,” wrote David Vellante, co-founder and principal contributor of the Wikibon user group in an email to Byte and Switch. “These are often fast-growing enterprises, and while they’re cost conscious, they often can’t get the leverage a big company can get out of cost-cutting measures.”

Despite the importance of security within mid-sized businesses, only 32 percent of respondents said that they were satisfied with how their company is addressing security concerns.

”I believe that the 32 percent of respondents that are ‘very satisfied’ with how their company is addressing security concerns are deluding themselves -- they should wake up and smell the coffee,” wrote Vellante. “As an industry, since 2000 we’ve spent billions on security in the form of virus protection, network security, firewalls and other infrastructure… do you feel more secure? No way!”

The challenge for many, particularly smaller firms, is linked to the fact that IT is becoming ever more complex, according to Vellante.

”Data growth is more difficult to manage than ever,” he wrote. “The gap between our ability to manage complexity and the rate of complexity growth is widening, not shrinking, making us less secure.”

The research also reveals that some 54 percent of midsized companies feel that they could be on a ‘level playing field’ with Fortune 500-size companies if they had access to the same technology, and a third of respondents acknowledged that their IT systems are not up to date.

”For the midmarket guys I talk to, technology is not the problem,” wrote Vellante. “It’s the skills and best-practice knowledge as to how to apply the technology to create business systems -- that is what is lacking at midmarket firms.”

In addition to outdated systems, IT executives’ top challenges are “integration of technology” and “IT resources to implement functionality,” which were both cited by almost half of the respondents. Other challenges/limitations to technology investments are “user training” (46 percent) and “lack of local talent” (29 percent).

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Byte and Switch's editors directly, send us a message.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.