Menu
Banking Exchange Magazine Logo
Menu

Security pros squeezed by criminals, business demands

Demand for security measures disconnects with budget constraints

 
 
Security pros squeezed by criminals, business demands

The rate and sophistication of malware and data breaches continue to accelerate, a trend that is proving seemingly impossible for businesses to counter. The men and women in the trenches charged with countering such attacks feel pressure coming at them from all sides, forcing them sometimes to make decisions they don’t necessarily want to make, according to a new study by Trustwave.

The survey polled 833 chief information officers, chief information security officers, and IT security directors worldwide, 526 of whom were in the United States. It found that overall security-related pressures increased from 2012 to 2013, with more pressure expected this year. Targeted malware topped the list of security threats exerting the most pressure, followed by data breaches and phishing/social engineering.

Internally, however, the survey found that four out of five IT pros were pressured in 2013 to roll out projects despite security issues. The IT pros were most pressured to use cloud and mobile applications, even though they felt they posed the greatest security risk. Other emerging technologies they felt posed risks included big data applications, BYOD programs, and social media.

When asked who specifically in their organizations exerted pressures to roll out programs with security measures, half said it came from the board of directors, owner, or C-level executive. However, budgets for new capital outlays associated with security were cited as being most under pressure, followed closely by monthly operational expenses and staff.

“IT pros are pressured to use security technology containing all of the latest features, despite one out of three not having the resources to do so effectively,” the study notes. Meanwhile, when asked for a wish list of what they’d like to have to do their job more effectively, these IT pros said more budget, more IT security skills, and more time to incorporate it all effectively.

The Trustwave report concludes with these recommendations:

  • Accept that mounting pressures, including attention from the board and other forms of internal scrutiny are increasing.
  • Malware is everywhere. Make anti-malware protection a top priority.
  • Augment in-house security expertise.
  • Perform business-wide security risk assessments and ongoing penetration testing.
  • Prioritize security awareness education.
  • Automate protection for web applications.
  • Stop buying security technologies for their flashy features, especially if IT doesn’t have the resources to use them.

(ABA’s affiliate Corporation for American Banking endorses Trustwave's Network Security and Data Protection Resources. Read more.)  

John Ginovsky

John Ginovsky is a contributing editor of Banking Exchange and editor of the publication’s Tech Exchange e-newsletter. For more than two decades he’s written about the commercial banking industry, specializing in its technological side and how it relates to the actual business of banking. In addition to his weekly blogs—"Making Sense of It All"—he contributes fresh, original stories to each Tech Exchange issue based on personal interviews or exclusive contributed pieces. He previously was senior editor for Community Banker magazine (which merged into ABA Banking Journal) and for ABA Banking Journal and was managing editor and staff reporter for ABA’s Bankers News. Email him at [email protected].

back to top

Sections

About Us

Connect With Us

Resources

On-Demand:

Banking Exchange Interview with
Rachel Lewis of Stock Yards Bank

As part of the Banking Exchange Interview Series we and SkyStem are proud to present our interview with Rachel Lewis, Assistant Controller at Stock Yards Bank & Trust.

In this interview, Banking Exchange's Publisher Erik Vander Kolk, speaks with Rachel Lewis at length. We get a brief overview of her professional journey in the banking industry and get insights into what role technology plays in helping her do her work.

VIEW INTERVIEW NOW!

This Executive Interview is brought to you by:
SkyStem logo