Companies in the Technology, Media & Entertainment and Telecommunications industries (TMT) are overconfident and underprepared to prevent security breaches, according to a new Deloitte survey.
The 2007 global security survey of more than 100 TMT organizations reveals that 46 percent of TMT companies surveyed do not have a formal information security strategy in place. Despite this lack of a formal security strategy for nearly half the respondents, 69 percent report they are “very confident” or “extremely confident” about their organization’s effectiveness at tackling external security challenges.
Additional findings include:
- Just 7 percent of TMT companies believe they are prepared for future security threats.
- In the past year, only 5 percent of companies increased their security investment by 15 percent or more. And half allocated less than 3 percent of their IT budget to security.
- Only 38 percent of companies believe their organization has all the skills and capabilities they need to respond effectively and efficiently to security challenges.
- Only 62 percent of respondents believe that security is a key imperative at the board or executive level.
With more and more people working outside the office – whether it is at home, in the car, or in a local coffeehouse – businesses must adopt an end-to-end security strategy that spans the extended enterprise. This model requires that enterprises pay close attention to the security of its mobile workers as well as the security capabilities of its business partners.
The study also revealed a concern amongst respondents in the area of insider threats, with only 56 percent displaying confidence in addressing employee misconduct, whether it be deliberate or accidental.
The convergence of physical and information security is something most TMT companies have not yet addressed, with 64 percent of respondents indicating they have done little or nothing to integrate the two. TMT companies could be missing out on opportunities to improve both information security and physical security by thinking about their strategy holistically.
For example, an access card or wireless chip normally used to control physical access could also be used to help prevent unauthorized information access. When someone tries to log on to an information system, the system could connect with the company’s physical security systems to make sure the person associated with that user ID is actually present in the building. If not, it could deny access and trigger a silent alarm.
There are signs that smarter security strategies will emerge in 2008 as the number of Chief Information Security Officers (CISOs) appointed in the companies surveyed increased from 57 percent to 65 percent in the past year. CISOs are still not industry standard among TMT corporate officers, yet they are one of the keys to effective information governance. The survey revealed that only 13 percent of CISOs have a tenure of over 10 years, whereas the highest percentage, 39 percent, responded having held a CISO position for just three to five years, indicating that there is still an upward trend toward governance frameworks overall.More information on Customer Relationship Management can be found at www.CRMindustry.com