{"id":1778,"date":"2004-10-29T00:00:00","date_gmt":"2004-10-29T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/29\/companies-under-security-pressure\/"},"modified":"2021-12-30T11:39:58","modified_gmt":"2021-12-30T11:39:58","slug":"companies-under-security-pressure","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/29\/companies-under-security-pressure\/","title":{"rendered":"Companies under security pressure"},"content":{"rendered":"<p>Most large companies are struggling to protect themselves against security threats, a survey suggests.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Failure to patch and update systems effectively after the identification of known threats is the single largest operational risk UK-based companies with operations overseas and more than 5,000 employees.<\/p>\n<p>A third of the sample of 40 senior UK-based IT security personnel said it took more than six hours to contain a new threat across their organization.<\/p>\n<p>A quarter (25 per cent) saw Distributed Denial of Service (DDOS) attacks as the single largest risk to their business, whilst laptop and Personal Digital Assistants (PDA) theft was the key concern for 8.3 per cent of respondents.<\/p>\n<p>Application-level threats are by far the most significant emerging threat for large companies this year, with 58 per cent of the sample stating that attacks against enterprise apps gave them the fear.<\/p>\n<p>The Sarbanes-Oxley Act is seen as having the most impact on enterprises&#8217; information security management planning in 2004 with 36 per cent of the sample giving this a top rating.<\/p>\n<p>BS7799-2:2002, the government&#8217;s gold standard for information security, came in third with just 19 per cent even though it was rated as the best framework for defining companies&#8217; Information Security Management Systems by the security pros quizzed by NetSec.<\/p>\n<p>David Howorth, sales director of NetSec UK Limited, commented: &#8220;The findings illustrate that large enterprises already recognise that they are buckling under the strain of the workload created by new vulnerabilities and threats.<\/p>\n<p>http:\/\/www.xatrix.org\/article3680.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1778","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1778"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1778\/revisions"}],"predecessor-version":[{"id":4265,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1778\/revisions\/4265"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}