{"id":1814,"date":"2005-05-24T00:00:00","date_gmt":"2005-05-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/24\/put-policies-before-products-in-it-security-battle\/"},"modified":"2021-12-30T11:40:03","modified_gmt":"2021-12-30T11:40:03","slug":"put-policies-before-products-in-it-security-battle","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/24\/put-policies-before-products-in-it-security-battle\/","title":{"rendered":"Put policies before products in IT security battle"},"content":{"rendered":"<p>Two-thirds of respondents to AusCert&#8217;s 2005 Computer Crime Survey admit there is still room for improvement when it comes to IT security staff training. Senior AusCert security analyst Jamie Gillespie said education of information security staff is paramount in improving security management.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Speaking at the AusCert conference on Queensland&#8217;s Gold Coast, where the survey was released yesterday, Gillespie said respondents admitted education has to be directed to IT security staff so they can more effectively manage the technology already in place. <\/p>\n<p>&#8220;Between 98 and 100 percent of companies surveyed use antivirus software yet they are still getting infected; this wouldn&#8217;t be happening if tools were employed properly,&#8221; Gillespie said.   Nearly 70 percent of respondents in the survey said their IT security staff have insufficient experience and training to meet the needs of their organization.   About 79 percent are concerned about the level of security training for general staff, and 76 percent are concerned about the lack of training within their organizations. <\/p>\n<p>The view within enterprises is that more dollars will solve security problems, but it is really about implementing and maintaining the right policies, Gillespie said. <\/p>\n<p>&#8220;There is a lack of information security policies and poor education related to following policies. The failure of using policies was instrumental in the downfall of one of the world&#8217;s most famous chartered accountancy firms.&#8221; <\/p>\n<p>http:\/\/www.arnnet.com.au\/index.php\/id%3B1011099138%3Bfp%3B8%3Bfpid%3B0<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1814","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1814"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1814\/revisions"}],"predecessor-version":[{"id":4301,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1814\/revisions\/4301"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}