September 6, 2016 By Larry Loeb 2 min read

The Ponemon Institute published a recent study that evaluated the way end users and security teams approach IT security policy. The study analyzed input from 1,371 users and 1,656 security professionals in various industries located in the U.K., U.S., France and Germany.

A Widening Gap

The report found a gap between end users and IT pros that has only widened over time. Specifically, 35 percent of end users said their organizations enforce their own internal data security policies, while 52 percent of IT pros believe those same data security policies are being enforced.

Not only that, but 61 percent of the respondents working in IT or security roles viewed the protection of critical company information as a “very high” or “high” priority. This greatly differs from what the study found in end users’ attitudes: Only 38 percent of end users considered it a high or very high priority to protect this kind of data. This seems to suggest that many end users lack a sense of awareness about data and its value.

Productivity Trumps IT Security Policy

Interestingly, productivity enters into the enterprise security equation. The Ponemon Institute study found that 38 percent of IT practitioners, as well as 48 percent of end users, felt that their companies would allow some sort of additional risk to the security of corporate data for the benefit of productivity.

Looking at specific data security policies, 39 percent of end users said they had taken all appropriate steps to protect the company data that they use within the course of their jobs. On the other hand, 52 percent of IT practitioners said employees in their organizations take the appropriate steps to protect this type of data.

An Alarming Decline

“At a time when one would expect general improvement in end-user hygiene due to increased awareness of cyberattacks and security breaches, this survey instead found an alarming decline in both practices and attitudes,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, as quoted by SC Magazine.

Sometimes, the very policies that should address a problem may exacerbate it. If the users and the IT folk feel so differently about the effects of security policies, it may be time to take a long hard look at how current policies are implemented and what can be changed to increase both user awareness and compliance.

More from

How will the Merck settlement affect the insurance industry?

3 min read - A major shift in how cyber insurance works started with an attack on the pharmaceutical giant Merck. Or did it start somewhere else?In June 2017, the NotPetya incident hit some 40,000 Merck computers, destroying data and forcing a months-long recovery process. The attack affected thousands of multinational companies, including Mondelēz and Maersk. In total, the malware caused roughly $10 billion in damage.NotPetya malware exploited two Windows vulnerabilities: EternalBlue, a digital skeleton key leaked from the NSA, and Mimikatz, an exploit…

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

ICS CERT predictions for 2024: What you need to know

4 min read - As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. Sectors like healthcare, finance, energy and transportation are all regularly widening their digital infrastructure, resulting in larger attack surfaces and greater risk exposure.Kaspersky just released their ICS CERT Predictions for this year, outlining the key cybersecurity challenges industrial enterprises will face in the year ahead. The forecasts emphasize the persistent nature of ransomware threats, the increasing prevalence of cosmopolitical hacktivism, insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today