September 6, 2016 By Larry Loeb 2 min read

The Ponemon Institute published a recent study that evaluated the way end users and security teams approach IT security policy. The study analyzed input from 1,371 users and 1,656 security professionals in various industries located in the U.K., U.S., France and Germany.

A Widening Gap

The report found a gap between end users and IT pros that has only widened over time. Specifically, 35 percent of end users said their organizations enforce their own internal data security policies, while 52 percent of IT pros believe those same data security policies are being enforced.

Not only that, but 61 percent of the respondents working in IT or security roles viewed the protection of critical company information as a “very high” or “high” priority. This greatly differs from what the study found in end users’ attitudes: Only 38 percent of end users considered it a high or very high priority to protect this kind of data. This seems to suggest that many end users lack a sense of awareness about data and its value.

Productivity Trumps IT Security Policy

Interestingly, productivity enters into the enterprise security equation. The Ponemon Institute study found that 38 percent of IT practitioners, as well as 48 percent of end users, felt that their companies would allow some sort of additional risk to the security of corporate data for the benefit of productivity.

Looking at specific data security policies, 39 percent of end users said they had taken all appropriate steps to protect the company data that they use within the course of their jobs. On the other hand, 52 percent of IT practitioners said employees in their organizations take the appropriate steps to protect this type of data.

An Alarming Decline

“At a time when one would expect general improvement in end-user hygiene due to increased awareness of cyberattacks and security breaches, this survey instead found an alarming decline in both practices and attitudes,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, as quoted by SC Magazine.

Sometimes, the very policies that should address a problem may exacerbate it. If the users and the IT folk feel so differently about the effects of security policies, it may be time to take a long hard look at how current policies are implemented and what can be changed to increase both user awareness and compliance.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today