{"id":2063,"date":"2004-10-21T00:00:00","date_gmt":"2004-10-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/21\/it-chiefs-use-scare-tactics-to-tighten-security\/"},"modified":"2021-12-30T11:40:34","modified_gmt":"2021-12-30T11:40:34","slug":"it-chiefs-use-scare-tactics-to-tighten-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/21\/it-chiefs-use-scare-tactics-to-tighten-security\/","title":{"rendered":"IT chiefs use scare tactics to tighten security"},"content":{"rendered":"<p>Despite increasing awareness of IT security threats, many IT administrators are reduced to using scare tactics to get management support for tighter security procedures, research has revealed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The poll of IT network and security administrators in SMEs to determine how they persuade management to change security practice found that almost half of respondents admit to advocating the fear factor.  Many respondents indicated that they have to present worst case scenarios involving confidentiality breaches, lost customers or liability charges to justify investments in information security technology.<\/p>\n<p>The use of scare tactics may be prompted by the fact that, according to additional findings from the poll, more than one in four (29 per cent) network administrators claim that senior management rarely, or never, change standard practices in response to security recommendations alone.  <\/p>\n<p>However, an encouraging 30 per cent indicated that rational facts, including cost-based analysis, productivity statistics and industry articles, are sufficient to prompt a reaction.<\/p>\n<p>Additionally, 51 per cent of respondents reported that senior management implement changes to security practices based on their recommendations most or all of the time.<\/p>\n<p>&#8220;This survey shows that SMEs can vary greatly in their approach to security.  Despite high profile attacks and regulatory pressure, a strong security-conscious culture is still not second nature to all organisations,&#8221; said Mark Stevens, chief strategy officer at WatchGuard.  &#8220;While many organisations treat security as a priority from the top down, and are very proactive in their approach, others require more persuasion to implement and update secure practices.  To protect against the threat of attack, executive sponsorship is critical.  Organisations need to adopt an approach that incorporates not only technology solutions, but ongoing user education as well as development and enforcement of security policies.&#8221;<\/p>\n<p>http:\/\/www.vnunet.com\/news\/1158895<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2063","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2063"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2063\/revisions"}],"predecessor-version":[{"id":4550,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2063\/revisions\/4550"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}