One in ten IT professionals cheat on firewall audit

IT professionals may not be following the Government’s lead towards transparency, according to a new survey.

Vulnerable computers

A survey released today has revealed infrequent firewall audits have led to questionable actions in the private IT sector and could lead to security risks.

The research, by Tufin Technologies, showed one in 10 IT professionals admitted they or a colleague had cheated on an IT audit to make it pass muster.

Advertisement - Article continues below

A lack of time and resources were the main reasons given by those who admitted to cheating, the survey said.

Michael Hamelin, chief security architect at Tufin Technologies, said companies that conduct audits irregularly are a cause for concern because out of sync firewall rules leave networks open to exploitation.

"Without the right automation tools, managing firewalls is complicated and time consuming making it very tempting for IT professionals to cheat to get their audit passed. But in the long run it will only cause more problems," Hamelin said.

Of the 242 respondents, 25 per cent said firewall audits took a week to conduct, and 30 per cent said they audited only once every five years.

More than a third of respondents said their firewall rule bases were a mess and were susceptible to hackers, network crashes and compliance violations.

The research comes at a time where the new coalition Government is making efforts to be more open with its data, releasing the numbers on public sector spending and IT contracts.

Advertisement
Advertisement - Article continues below

However, the survey claimed private IT companies only invested into and pay attention to the firewalls selection process, instead of following them up and making sure they were fully optimised.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020