The rapid development of BYOD, mobile, cloud computing, the Internet, as well as unexpected and malicious internal behavior, has spawned a new generation of unknown security threats that are bringing a lot of fresh risks to the enterprise. However, according to a recent Dell Global security survey, most IT executives around the world say these threats are not their main security risks, and they do not first understand how to discover and address these security vulnerabilities at many sources. In fact, only 37% of respondents view the unknown threat as a major security risk for the next five years.
Contagious threats can come from every corner of the enterprise and are often hidden in the wrong configuration and inefficient data management, access management, and usage policies. Through a survey of leading public and private sector security decision-makers, Dell's global Security survey assesses their awareness and preparedness for a new wave of threats to IT security.
The main findings include:
1, 64% of respondents agreed that companies need to restructure their IT processes and work better with other departments to move ahead of the next new security threat. 85% of respondents in the United States said they needed to do this, while the UK and Canada were 43% and 45%, and the two countries had the lowest rates of recognition.
2, nearly 90% of respondents think that the Government should participate in the development of Enterprise's network defense strategy, while 78% of U.S. respondents believe the federal government plays an active role in helping companies defend themselves against internal and external threats, it underscores the need for strong public sector leadership and guidance in helping to protect the private sector.
Unknown threats from all corners, including internal and external enterprises
Social engineering, malicious and/or accidental internal attacks, and a significant increase in complex, high-level, persistent threats mean that businesses are vulnerable in every way. All stakeholders must take immediate action to enhance access to the internal and external points of the enterprise and help users prevent such attacks.
1 and 67% per cent of respondents said they had increased spending on staff education and training in the past 12 months, and 50% per cent considered higher priority for security training for new and existing employees.
2 and 54% per cent said they had increased spending on monitoring services last year, a figure of 72% in the United States.
Among the IT decision makers surveyed, BYOD, cloud computing and the Internet were considered to be the main areas of security threats.
byod--a considerable number of respondents think that mobile is the root cause of the violation, more and more mobile and user choice makes the network flooded, so that many ways to bring harm data and harm applications.
(1) 93% of the companies surveyed allow employees to use personal equipment while working. 31% of end users access the network via personal devices (37% in the United States).
(2) 44% per cent of respondents said it was important to BYOD security policy in order to prevent security breaches.
(3) 57% of respondents viewed mobile devices as an important security risk for the next five years (71% in the UK).
(4) 24% of respondents said that misuse of mobile device/Os vulnerabilities is the root cause of security breaches.
Cloud computing-many companies are currently using cloud computing, which poses an unknown security threat and leads to targeted attacks on enterprise data and applications. The findings show that these hidden threats are highly risky.
(1) 73% of respondents said their companies were using cloud computing (90% in the US).
(2) Nearly half (49%) of respondents put cloud computing as an important security risk for the next five years, reflecting concerns about the future, with only 22% per cent saying data transfer to the cloud is a major security risk.
(3) Consider security to be the main priority for next year's business, and 86% are using the cloud.
(4) 21% per cent of respondents believed that using cloud applications or services was the root cause of their security breaches.