Sie sind hier: Startseite » Markt » English News

Vulnerability of UK Companies


Cloud Computing and Social Networking Leave UK Businesses Exposed to Cyber Attacks, Survey Shows
Very Few Organisations are Encrypting Data Held on Virtual Storage, Including the Cloud


(07.06.10) - Business use of technology is evolving faster now than at any point in the last decade. Internet use has moved way beyond E-Mail and websites and into the realms of social networks and externally-hosted Software services accessed across the Internet (often referred to as cloud computing). These changes have increased the vulnerability of UK companies and public sector organisations to new cyber attacks. Hacking and denial of service attacks have doubled in the last two years. As a result, security remains high on management’s list of priorities.

These were among the preliminary findings of the 2010 Information Security Breaches Survey (ISBS) commissioned by Infosecurity Europe and written by PricewaterhouseCoopers LLP.

The rate of adoption of newer technologies has accelerated over the last two years and most respondents now say they use wireless networking, remote access and VoIP. Some 85 percent of smaller organisations said they were using wireless, almost double the use in 2008. The number of organisations allowing staff to have remote access to their systems has also increase with nine tenths of large companies now doing this.

As organisations have looked to cut their IT costs, they have increasingly turned to external providers who host applications on their behalf. These services, including Software-as-a-Service (SaaS) and Cloud Computing, are now used by over three-quarters of the organisations polled and of these, 44 percent said they were entrusting critical services to third parties. All sectors are making use of the services, but government is least likely to release control of critical services.

At the same time that companies are increasing their dependence on other organisations for their IT services, there has been an explosion of new cyber attacks. 61 percent of large organisations have detected a significant attempt to break into their network in the last year, twice as many as two years ago.

Some 15 percent of large organisations have detected actual penetration by an unauthorised outsider into their network in the last year, and it is likely that many more were undetected. 25 percent of large organisations have suffered a denial of service attack in the last year, also more than double the proportion in 2008. Outsourcing IT services does not make the security risk go away, but few companies are taking enough steps to ensure their outsourced services are not vulnerable to attack.

Chris Potter, partner, OneSecurity, PricewaterhouseCoopers LLP, said: "Very few organisations are encrypting data held on virtual storage, including the 'cloud'. Worryingly, only 17 percent of those with highly confidential data at external providers ensure that it is encrypted. Virtualisation and cloud computing seem to be set to follow the trend, established over the last decade, of controls lagging behind adoption of new technologies. Given the increased criticality and confidentiality of information held on virtual storage, organisations need to respond quickly to close this control gap.”

Responding to the data leakage threat
The increasingly inter-connected business environment and prevalence of externally provided services is reflected by a growing data leakage threat. That threat is driving an increased demand for assurance over third parties. ISO 27001 is becoming a common standard for compliance; 40 percent of large organisations are being asked to demonstrate compliance with the standard.

ISO 27001 and PCI (Payment Card Industry) standards are also driving adoption of some specific security mechanisms. PCI, in particular, is driving more encryption of website transactions and sensitive data fields in databases. However, organisations that need to meet government requirements are more likely to encrypt data transfers and removable media.

Andrew Beard, director, OneSecurity, PricewaterhouseCoopers LLP, said: "It seems that organisations will respond to specific requirements mandated by government or other authorities, but when the requirements are less explicit, adoption of good practice is lower. Assurance reporting appears to increase organisations level of comfort. However, as adoption of the assurance reporting standards remains low, it seems likely that some organisations have a false sense of security."

Staff postings to social networking sites pose a new data leakage risk. Yet, at the same time, social networking is increasingly important to businesses. Organisations are reassessing their approach to controlling staff access to the Internet. The trend, established between 2006 and 2008, of allowing more staff to access the Internet has been reversed. Nearly half of large organisations now restrict which staff can access the Internet; less than a third did so in 2008.

Organisations want to allow effective use of the Internet, but reduce inappropriate use. Use of Software to block access to inappropriate websites is slightly up on two years ago. Web access logging and monitoring is relatively static. However, more sophisticated use is being made of these tools than in the past. Organisations are one and a half times as likely to monitor postings to social networking sites if social networking is considered very important to their business. (Infosecurity Europe: ra)

Infosecurity Europe: Kontakt und Steckbrief

Der Informationsanbieter hat seinen Kontakt leider noch nicht freigeschaltet.


Kostenloser PMK-Verlags-Newsletter
Ihr PMK-Verlags-Newsletter hier >>>>>>


Meldungen: Unternehmen

  • Virtualisierte Workloads betreiben

    Red Hat hat ein Strategic Collaboration Agreement (SCA) mit Amazon Web Services (AWS) unterzeichnet. Dieses baut auf der langjährigen Partnerschaft der beiden Unternehmen auf und erweitert die Verfügbarkeit der Open-Source-Lösungen von Red Hat im AWS Marketplace.

  • Fivetran vereinfacht Datenintegration

    Fivetran, Unternehmen im Bereich modernes Data Movement, erzielte ein Wachstum von 40 Prozent gegenüber dem Vorjahr auf dem Amazon Web Services (AWS) Marketplace. Dies ist auf die steigende Nachfrage von Unternehmen nach künstlicher Intelligenz (KI) und Analysen zurückzuführen.

  • "Red Hat OpenShift Service on AWS"

    Red Hat hat ein Strategic Collaboration Agreement (SCA) mit Amazon Web Services (AWS) unterzeichnet. Dieses baut auf der langjährigen Partnerschaft der beiden Unternehmen auf und erweitert die Verfügbarkeit der Open-Source-Lösungen von Red Hat im AWS Marketplace.

  • Eine führende Kraft in der Cloud

    Cloud-Anbieterin OVHcloud stellte auf dem OVHcloud Summit 2024 ihre neuesten Innovationen vor. Die Veranstaltung brachte ein breites Ökosystem von Entscheidungsträgern und Technologieexperten in der Maison de la Mutualité in Paris zusammen.

  • Kontinuierliche Risikobewertung

    Trend Micro, Anbieterin von Cybersicherheitslösungen, baut ihr Angebot für Managed Service Provider (MSPs) weiter aus. Die Plattform "Trend Vision One for Managed Service Providers" stellt ihnen umfassende Funktionen zur Erkennung und Abwehr von Bedrohungen bereit und unterstützt sie dabei, ihren Kunden einen proaktiveren Sicherheitsansatz zu bieten.

  • Transparenz der zu erwartenden Kosten

    Nutzer der "Ionos Cloud"-Angebote können ab sofort die Kosten ihrer Virtuellen Data Center (VDC) vor Bereitstellung kalkulieren. Die neue Anwendung ermöglicht volle Transparenz der zu erwartenden Kosten und ist damit eine wichtige Entscheidungsgrundlage für die Nutzung der Ionos Cloud.

  • Betrugs- und Risikoschutz

    Ping Identity, Anbieterin für die Sicherung digitaler Identitäten, hat wichtige Wachstumsmeilensteine erreicht, darunter ein Jahr-für-Jahr-Wachstum von 31 Prozent bei den Software-as-aService (SaaS)-Angeboten und die Annäherung an 800 Mio. USD Annual Recurring Revenue (ARR), was die Marktführerschaft im Bereich Identitätslösungen weiter festigt.

  • AWS-Migration und -Modernisierung

    Precisely, Anbieterin von Datenintegrität, hat bekannt gegeben, dass sie den Amazon Web Services (AWS) Migration and Modernization Competency Status für AWS Partner erreicht hat.

  • Privilegierte Zugriffe zuverlässig identifizieren

    CyberArk ist eine Partnerschaft mit dem Cloud Security Provider Wiz eingegangen. Beide wollen das Sicherheitsniveau in Multi-Cloud-Umgebungen deutlich verbessern. Sie liefern Unternehmen vollständige Sichtbarkeit und Kontrolle über die privilegierten Zugriffe von Menschen und Maschinen in der Cloud - und das, ohne die Geschwindigkeit und Skalierung der Cloud-Anwendungsentwicklung zu beeinträchtigen.

  • Cloud Native Security

    Die Cloud Native Computing Foundation gibt die Graduierung des "cert-managers" bekannt. cert-manager unterstützt Cloud Native-Entwickler bei der Automatisierung der Ausstellung und Erneuerung von Transport Layer Security (TLS)- und Mutual Transport Layer Security (mTLS)-Zertifikaten.

Wir verwenden Cookies um unsere Website zu optimieren und Ihnen das bestmögliche Online-Erlebnis zu bieten. Mit dem Klick auf "Alle akzeptieren" erklären Sie sich damit einverstanden. Erweiterte Einstellungen