{"id":1890,"date":"2006-09-27T00:00:00","date_gmt":"2006-09-27T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/27\/protecting-corporate-reputation-a-key-aim-of-it-security\/"},"modified":"2021-12-30T11:40:14","modified_gmt":"2021-12-30T11:40:14","slug":"protecting-corporate-reputation-a-key-aim-of-it-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/27\/protecting-corporate-reputation-a-key-aim-of-it-security\/","title":{"rendered":"Protecting corporate reputation a key aim of IT security"},"content":{"rendered":"<p>A global survey has found Canadian companies are more concerned with protecting their reputations than their global competitors when they spend on information security.  &#8220;Poor information security that loses data such as customer profiles can seriously affect a company&#8217;s brand,&#8221; says Greg Murray of PricewaterhouseCoopers.  The study found that 67 per cent of Canadian organizations actively engage both business and IT decision-makers in addressing information security issues, compared to 52 per cent worldwide.  When it comes to overall spending, 48 per cent of companies said their information security budgets will increase in 2006, while 42 per cent said it will stay the same.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>All departments are affected by breaches to information security &#8212; it&#8217;s much more than just an IT issue, it&#8217;s a business issue.&#8221;<\/p>\n<p>Mr. Murray was surprised to find that 61 per cent of Canadian respondents surveyed have limited or no security training for the end-users of technology &#8212; their employees.<\/p>\n<p>&#8220;Over the long term, organizations need to create a culture of security in the workplace, where employees recognize the threats to their organization&#8217;s information security and how they can combat them,&#8221; he says.<\/p>\n<p>When it came to staffing, almost two-thirds of Canadian organizations were found to be dedicating two or less full-time employees or equivalents to information security.<\/p>\n<p>http:\/\/www.ottawabusinessjournal.com\/287132340207207.php<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1890","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1890"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1890\/revisions"}],"predecessor-version":[{"id":4377,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1890\/revisions\/4377"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}