{"id":1969,"date":"2010-01-08T00:00:00","date_gmt":"2010-01-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/01\/08\/csi-computer-crime-and-security-survey-shows-poor-security-awareness-training-in-public-and-private\/"},"modified":"2021-12-30T11:40:23","modified_gmt":"2021-12-30T11:40:23","slug":"csi-computer-crime-and-security-survey-shows-poor-security-awareness-training-in-public-and-private","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/01\/08\/csi-computer-crime-and-security-survey-shows-poor-security-awareness-training-in-public-and-private\/","title":{"rendered":"CSI Computer Crime and Security Survey Shows Poor Security Awareness Training in Public and Private"},"content":{"rendered":"<p>It&#8217;s no secret that security pros worry about cyber-attacks that can happen anytime in a networked world, but apparently, they also worry about how much end-users know about good computer hygiene and their organizations&#8217; abilities to assess how secure they are &#8211; or aren&#8217;t.  The Computer Security Institute (CSI), which holds conferences and educational events for IT workers, released the 14th edition of its annual CSI Computer Crime and Security Survey in December 2009, with an assessment of how respondents felt about their own cyber-security situations and what that assessment may mean for 2010.  A whopping 43.4 percent of them said that less than 1 percent of their security budget was allocated to awareness training, and 55 percent said current investments in this area were inadequate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The institute asked respondents to rate how satisfied they were with their technologies on a scale of 1 to 5.  All technologies fell within the 3.0 to 3.6 range, which isn&#8217;t bad, but the tools that scored the lowest in that zone were the ones that are supposed to indicate how secure an organization is at any given moment.  &#8220;They weren&#8217;t wildly happy with anything nor, on the other hand, were they wildly unhappy with anything, but it sort of indicates to me that there&#8217;s an acceptance of the tools we have,&#8221; said Robert Richardson, CSI&#8217;s director.  The tools mentioned in the survey overview included log management tools, data leak prevention, content monitoring and intrusion detection tools.<\/p>\n<p>A whopping 43.4 percent of them said that less than 1 percent of their security budget was allocated to awareness training, and 55 percent said current investments in this area were inadequate.<\/p>\n<p>Twenty-five percent of respondents said more than 60 percent of financial losses came from accidental breaches by insiders, not external hacks, and 16.1 percent said 81 to 100 percent of all losses came from accidental breaches as well.<\/p>\n<p>Government agencies constituted more than 13 percent of survey participants, comprising people from federal, local, military and law enforcement jurisdictions.<\/p>\n<p>Richardson thought the results were telling, but he wondered about the experiences of those who didn&#8217;t respond.<\/p>\n<p>http:\/\/www.govtech.com\/gt\/736410?topic=117671<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1969","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1969"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1969\/revisions"}],"predecessor-version":[{"id":4456,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1969\/revisions\/4456"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}