Quantcast
Channel: IT security survey – Identity Week
Browsing all 16 articles
Browse latest View live

Compelling IT Survey, Weak Solution

Last week a software vendor published an IT survey stating that over 40% of IT staff abuse administrative passwords to access sensitive information that’s not relevant to their jobs. This particular...

View Article



39% of IT Staff Can Get Unauthorized Access to Sensitive Data

If there’s one thing we enjoy here at Identity Week, it’s conducting anonymous surveys to learn what’s really going on down at the admin level in IT shops around the world. Here’s what we found out...

View Article

Cyber Threats Evolving Too Fast to Keep Up With

These survey results seem to show that it doesn’t matter how many people you have guarding your network. Persistent hackers will always find a way in. The post Cyber Threats Evolving Too Fast to Keep...

View Article

Why Isn’t There a Greater Emphasis on Proactive Cyber Defense?

IT professionals warn their management about looming IT security disasters, but say it’s the executives who fail to take action. The post Why Isn’t There a Greater Emphasis on Proactive Cyber Defense?...

View Article

Most IT Security Pros Expect Imminent State-Sponsored Cyber Attacks

59% of IT security pros expect their network to come under attack in the near future. Digging deeper into the data we discovered this: among those who expect to be attacked, 44% are not confident they...

View Article


Can You Detect a Cyber Intrusion on Your Network?

According to Symantec Research Labs, zero day exploits persist in networks for 312 days on average before being discovered. And it’s no wonder - nearly one out of three IT professionals are not...

View Article

Nearly Half of Infosec Professionals are Unprepared for Modern Cyber Attacks

Many of these breached companies passed their regulatory compliance audits and invested heavily in conventional perimeter security tools - like firewalls – without success. Spear phishing, zero days...

View Article

Do As I Say, Not As I Do When Managing Passwords

Changing user passwords on a regular basis has long been a basic – and well known - tenet of IT security. But when it comes to password security, privileged passwords (admin, root and such) are often...

View Article


4 Out of 5 IT Pros Agree – Employees Deliberately Ignore IT Security Rules

For all of you IT admins and managers privately suspicious that no matter what you do to protect the security of your network, your end-users will thwart you anyway – guess what? Our latest survey...

View Article


Clueless Executives Equals IT Security Nightmare

This year Lieberman Software conducted a survey of nearly 500 IT professionals who attended RSA Security 2011 in San Francisco and InfoSec 2011 in London. Both CIO Insight and Channel Insider put...

View Article

IT Outsourcing is Costlier Than Expected

For the second consecutive year our IT Outsourcing Survey, conducted at InfoSec Europe 2012, revealed some grim statistics for those who see outsourcing as an effective cost-cutting measure. More than...

View Article

Survey Says it’s Still Difficult to Secure Data in the Cloud

43% of respondents admitted they do not change their credentials in the cloud as frequently as they do on premises. The post Survey Says it’s Still Difficult to Secure Data in the Cloud appeared first...

View Article

Will the Cloud End the Traditional IT Team?

If the cloud becomes the primary data center, will there even be a need for a traditional IT department? A third (33%) of nearly 140 IT pros polled thought that the cloud will be the end of the...

View Article


How Many Extra Hours a Week Do IT Professionals Work?

The survey revealed, to no great surprise, that the majority (74%) of IT professionals work unpaid overtime each week. However, 34% reported working an average of more than 15 extra hours a week. The...

View Article

Cyber Criminals are Automating – Why Can’t We?

What if organizations could react to cyber attacks with an automated defense? If they could take control of their privileged accounts it would reduce the attacker’s surface for compromise. The post...

View Article


The State of IoT Security, According to the IT Pros

The survey queried respondents about changing default passwords on IoT devices. More than half admitted they do not have a process to change these passwords. The post The State of IoT Security,...

View Article
Browsing all 16 articles
Browse latest View live




Latest Images