Most security pros (88 percent) say that they are happy with their organisation's security strategy, but 38 percent admit that their company doesn't have dedicated data loss prevention solutions in place.
New research from Computacenter conducted at InfoSecurity Europe 2016 surveyed more than 200 IT security professionals for insight into how UK businesses are using technology to harness the power of data to strengthen security strategies.
The results reveal that 95 percent of IT professionals are very aware of the risks associated with the increasing move towards cloud and other advanced technologies. Almost two thirds (62 percent) stated that they have some measures in place to protect against these risks.
Over half (53 percent) identified defining a cloud strategy as a key point that needs to be addressed. The need to increase employee knowledge, such as education on common security threats and preventative measures was pointed out by 52 percent of respondents. Over 30 percent highlighted the desire to change cloud providers as vital step to enhancing the level of security they are provided.
“Data is the lifeblood of any organisation, so any risk directly impacts the business. The findings of our latest research show that organisations must thoroughly look at their security strategies to ensure a holistic approach is in place to address all of the requirements of their business model”, says Colin Williams, chief technologist of networking, security and unified communications at Computacenter. “Traditional reactive approaches to security will no longer suffice in our increasingly digitised and mobile world, so decision-makers must rethink their approach to implement a visibility-rich, analytics-driven approach to deliver effective information security.”
Bill McGloin, chief technologist, information at Computacenter adds, “Understanding and traversing the security landscape is difficult for even the most experienced IT professional. Companies must gain an understanding of the steps needed to better inform their security strategies.”