By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data-driven white label SEO
    Does Data Mining Really Help with White Label SEO?
    7 Min Read
    marketing analytics for hardware vendors
    IT Hardware Startups Turn to Data Analytics for Market Research
    9 Min Read
    big data and digital signage
    The Power of Big Data and Analytics in Digital Signage
    5 Min Read
    data analytics investing
    Data Analytics Boosts ROI of Investment Trusts
    9 Min Read
    football data collection and analytics
    Unleashing Victory: How Data Collection Is Revolutionizing Football Performance Analysis!
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: The Biggest Threat to Cyber Security and What to Do About It
Share
Notification Show More
Aa
SmartData CollectiveSmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Best Practices > The Biggest Threat to Cyber Security and What to Do About It
Best PracticesCulture/LeadershipData ManagementJobsPolicy and GovernanceRisk Management

The Biggest Threat to Cyber Security and What to Do About It

jonsmithinsight
Last updated: 2013/10/08 at 8:00 AM
jonsmithinsight
5 Min Read
SHARE


Cyber SecurityThe high level of human error-induced risks does suggest that as measured by column inches most people are looking in the wrong place, writes Ashley Gatehouse.


Cyber SecurityThe high level of human error-induced risks does suggest that as measured by column inches most people are looking in the wrong place, writes Ashley Gatehouse.

More Read

data security

NIST 800-171 Safeguards Help Non-Federal Networks Handling CUI

Security In Automated Document Processing: Ensuring Data Integrity And Confidentiality
How Good Leaders Keep Data in Perspective
What Your Phone Number’s Metadata Means for Data Privacy
How to Compensate for Blind Spots and Biases in Your Security Strategy

Tech leaders have long been telling anybody who will listen that the biggest cyber security threat they face is not state-sponsored, geopolitical or clandestine. It is in fact much closer to home.

Take, as evidence, the latest research by IT Governance’s Boardroom Cyber Watch 2013 survey. Accordingly, 53 per cent of senior company executives said the main risk to corporate data and computer systems is from their own employees. A case of human error, carelessness or ignorance? In some cases it’s a combination of all three.

By comparison 27 per cent cited cyber criminals, 12 per cent state-sponsored cyber attackers and 8 per cent competitors as the biggest single security peril.

The report was published in the same week that NHS Surrey was fined £200,000 after a hard drive full of data was bought on eBay . The hard drive contained 3,000 patient files. Coincidence of timing? Those IT managers and directors that warn of the malign influence of the “accidental cyber criminal” think not. Here was just another case of serious data loss that had very little to do with hardened criminals or criminal states.

The survey is a useful antidote to the mainstream coverage of cyber security in the past weeks and months. That’s not to down play those forms of threat and the publication of the government’s cyber security strategy in February is evidence of how seriously the risks are taken. A quarter of the 260 respondents to the IT Governance survey said their company had come under a “concerted attack” over the last year. Another quarter (the same quarter?) admitted that fear of attack kept them awake at night.

Chloe Smith, minister with responsibility for cyber security (yes, there is such a role) told a recent Prospect roundtable debate: “I don’t think there has to be a trade-off between being skilful online and being able to deal with these threats. It should be the same thing.”

All this notwithstanding, the propensity of human error-induced risks does suggest that, as measured by column inches, most people are looking in the wrong place. The accidental cyber criminal may be a less interesting story but it is, for most organisations, a more significant one.

As we’ve noted before the answer to cyber security threats “is as much about policy and due diligence as it is about the underlying technology. And as always for the IT department it’s about managing expectations upwards.”

This is reflected in the comments of IT Governance CEO Alan Calder:
“Companies are not ignorant of the risks: 77% of bosses told us their organisation has a method for detecting and reporting attacks or incidents. However, in the boardroom, many companies still appear too removed from the action for directors to meet their governance obligations.”

Whether it is the role of the directors to ensure they are less “removed” or the IT department to keep them more involved is another question. A combination of the two would appear sensible; IT representation on the board even more so.

In that earlier post we suggested that if unwanted access was the biggest threat, then a couple of obvious stress points in modern computing architecture are co-location and mobility. For NHS Surrey the point of stress, according to the information commissioner’s office, was an ill-advised outsourcing deal.

“The result was that patients’ information was effectively being sold online. This breach is one of the most serious the ICO has witnessed and the penalty reflects the disturbing circumstances of the case,” said Stephen Eckersley, the ICO’s head of enforcement.

-Ashley Gatehouse

jonsmithinsight October 8, 2013
Share This Article
Facebook Twitter Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

big data and IP laws
Big Data & AI In Collision Course With IP Laws – A Complete Guide
Big Data
ai in marketing
4 Ways AI Can Enhance Your Marketing Strategies
Marketing
sobm for ai-driven cybersecurity
Software Bill of Materials is Crucial for AI-Driven Cybersecurity
Security
IT budgeting for data-driven companies
IT Budgeting Practices for Data-Driven Companies
IT

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

You Might also Like

data security
Data Management

NIST 800-171 Safeguards Help Non-Federal Networks Handling CUI

5 Min Read
data integrity
Data Management

Security In Automated Document Processing: Ensuring Data Integrity And Confidentiality

7 Min Read
How Good Leaders Keep Data in Perspective
Data Management

How Good Leaders Keep Data in Perspective

6 Min Read
data privacy phone metadata
News

What Your Phone Number’s Metadata Means for Data Privacy

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?