eCrime Survey 2011

Cautiously comfortable, but not complacent...

Summary

At the end of 2010 The Corporate IT Forum's Information Security Service conducted its annual survey to understand and measure the trends and changes businesses are experiencing with eCrime, malware and the threat landscape.  42 respondents from over 20 organisations answered questions on increasing levels of malware, breaches and threats experienced.  This survey also looked at organisations' experiences with reporting external and the impact of eCrime to the business.  Contributing organisations represent an annual IT spend of £4.72 billion and employ over 600,000 people.

Overall the findings show a positive landscape of corporate IT dealing with eCrime, this can be down to a rigorous approach, continued good practice and ongoing vigilance.  Some headline findings include:

  • eCrime Attacks against Corporate Britain under control:The Forum's previous eCrime Reality Checker discovered that eCrime against corporate Britain was on the rise - by almost 70% compared with 2007. In contrast, the results from this latest survey indicate that this increase has practically halted with the majority of respondents experiencing no increase
  • External and Internal Threats Mitigated: eCrime is as much about the danger from within as the danger from without. Although the number of attacks reported is higher respondents view these as having a minor impact or having been mitigated successfully.
  • Breaches are contained: Respondents indicate that, as a whole, security breaches can and do occur across all breach categories, but are very largely contained or mitigated successfully.
  • No change in attack levels: Increase in attacks is slight, if at all, with the majority of respondents experiencing no increase.
  • Secure policies in place: 100% of respondents have a Formal IT and /or Information Security Policy encompassing acceptable usage of corporate ICT equipment.
  • 'Build in not bolt on': This 'security first' ethos illustrates the importance of security considerations in the 'security aware' organisation of today.
  • One third are not looking up at the clouds: Access rights, data protection, security governance as well as assurance over suppliers are the biggest perceived threats of moving to Cloud computing.
  • Approaches in place: All responding organisations believe they are adopting, or have in place, an approach to security that enables them to respond to the current and future threat landscape - 'cautiously comfortable, but not complacent'.
Log in to access the full resource or buy it for £195 +VAT   

Information request

I'd like to know if my organisation is already a member
Sign me up for the monthly newsletter
Name*
Company*
Job Title*
Email*
Telephone
General enquiry or comment?
18998317
Sum the two numbers in white
and enter the total value below


Unparalleled Learning

Members Include

dmg-media-logo-colour-RGB-WEB-250px
johnlewis
mcdonalds
united biscuits
travis perkins
southwestwater
rexam
landregistry
HMRC
gchq
eon
dhl
EnvironmentAgency
BalfourBeatty
coop
BAE
aviva
01/17 
start stop bwd fwd

"Just wanted to say thanks; another great day where I have come out with more knowledge than I entered with"

"Many thanks; [the event was] very good and beneficial"

"I have never not found a day interesting"

"The Corporate IT Forum is a fantastic level check, free of vendor sell and consultancy hype. I like the open sharing of experience…"

"We get valuable knowledge and experience from members of The Corporate IT Forum. This helps us to make better and informed decisions to reach our business goals…"

"The knowledge from other people on what they are doing/have done is invaluable to my team"

"The workshop validated the marketplace for supplier apps; participants were of a uniformly high standard; personally, I value highly the ethos of the Forum in the fact that it is supplier independent"

Tel: +44 (0) 1442 866634
info@corporateITforum.com

Related Content

  • HDX Flash Redirection (Q&A Feb 2014)
  • IT Risk and Service Continuity Management (Report Jan 2014)
  • Cybercrime Resources (Q&A Nov 2013)
  • IT Risk Management (Reality Checker Feb 2013)
  • tISS: Security Strategies & Metrics (Reality Checker Nov 2012)
  • Change Management - Scheduling & Risk (Q&A Mar 2012)
  • tISS: IT Security Risk Management (Report Jan 2012)
  • IT Risk Management (Reality Checker Dec 2011)
  • Chinese Office Communications (Q&A Aug 2011)
  • Brand Monitoring Services (Q&A Apr 2011)
  • tISS: Cryptography - Tackling the latest Challenges (Report Jan 2011)
  • tISS Malware & Threat Perception (Reality Checker Dec 2010)
  • IT Security Risk Management (Report Dec 2010)
  • Governance in an Outsourced Environment (Report Sep 2010)
  • eCrime Survey 2009 (Reality Checker Nov 2009)
  • Banner
    Banner