{"id":1799,"date":"2005-03-15T00:00:00","date_gmt":"2005-03-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/15\/when-it-comes-to-security-ignorance-is-bliss-at-the-top\/"},"modified":"2021-12-30T11:40:01","modified_gmt":"2021-12-30T11:40:01","slug":"when-it-comes-to-security-ignorance-is-bliss-at-the-top","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/15\/when-it-comes-to-security-ignorance-is-bliss-at-the-top\/","title":{"rendered":"When it comes to security, ignorance is bliss at the top"},"content":{"rendered":"<p>European IT chiefs have revealed a shocking awareness of security threats &#8212; apparently favouring an &#8216;ignorance is bliss&#8217; mentality which leaves them all highly confident about the state of their crumbling security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Latest research reveals the majority of IT bosses are confident about their companies&#8217; security yet when drilling down through the findings we find a picture of disarray as companies lose track of laptops, remote access, the latest threats and the risk of employee wrong-doing.<\/p>\n<p>According to findings released today, 99 percent of respondents said they are protected from threats while only three percent of European IT bosses believe they will never be 100 percent secure.<\/p>\n<p>Mark Murtagh, European technical director at Websense &#8212; a provider of Web filtering and Internet securtity services which commissioned the research &#8212; said it paints a worrying picture for companies.<\/p>\n<p>Eight percent of companies have no additional security in place beyond desktop antivirus and a firewall and many are being slow to react to the latest threats.  Despite it being an issue which has hit the headlines in a big way over the past 12 months spyware is still getting an easy ride, with 35 percent of companies having no protection of any kind in place.  And the ways in which spyware can get onto a machine continue to thrive with 56 percent of firms letting staff install and use peer-to-peer software &#8212; a common source of malicious code &#8212; and 43 percent of firms doing nothing to limit employee Web-surfing.<\/p>\n<p>Furthermore 62 percent of companies are doing nothing to limit staff access to phishing sites.<\/p>\n<p>And if staff decide to turn on their company and steal data or access areas of the network they shouldn&#8217;t, only 40 percent are equipped to identify them.  More than two-thirds of UK IT bosses (68 percent) think laptops, which are taken home or used remotely and then plugged back into the network, pose a security risk and yet only a quarter (26 percent) are really doing anything about it.  Only 21 percent believe it is the responsibility of the IT department while six percent said they don&#8217;t know who is responsible.<\/p>\n<p>While 40 percent of respondents claim to audit PCs every three to six months, Murtagh believes this may amount to little more than &#8216;head count&#8217; &#8212; &#8220;how many have we got and what operating system are they running?&#8221;.  &#8220;Companies need to seriously audit PCs and undertake full risk assessment.  I&#8217;d like to think if we did this survey again in six months I&#8217;d have some cause for optimism but there will still be a large number of companies who have failed to get a grip on their Internet security,&#8221; said Murtagh.<\/p>\n<p>http:\/\/news.zdnet.co.uk\/internet\/security\/0,39020375,39191336,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1799","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1799"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1799\/revisions"}],"predecessor-version":[{"id":4286,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1799\/revisions\/4286"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}