Study reveals massive shortfall in endpoint security

30 per cent of IT decision makers do not know if they have security solutions in place

Security

Companies are not doing enough to secure their endpoints despite rising fears, a new report has revealed.

According to a study of almost 2,000 IT professionals and decision-makers by security firm Code42, just under 90 per cent of CIOs and CISOs agree that losing business data stored on corporate endpoints would be "seriously disruptive or business-destroying".

However, over half of IT decision-makers state that end users do not fully appreciate these risks, and a shocking 30 per cent do not have -- or do not know if they have -- endpoint data security measures in place.

This is on top of a study from CGI that showed while over 30 per cent of UK C-suite executive see cyber-security as an IT issue, security accounts for just 9 per cent of overall IT spend.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

4 out of 10 senior business leaders in the UK also say that their company is likely to experience a breach in the next 12 months, with a mere 53 per cent confirming they have crisis plans in the event of a catastrophic data exfiltration.

This is evidently not helping confidence within the business; Code42 reports that a quarter of all surveyed employees stated that they did not trust the company and its IT team with their personal data.

"Endpoint data management is a necessity along with data loss prevention software and data encryption," Quocirca founder Clive Longbottom said.

"Data should be centralised wherever possible and tracked and controlled through digital rights management solutions whenever it leaves the control of that central point."

"Attempting to rely on the knowledge and goodwill of a changing workforce is not enough - the right tools have to be put in place."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/29068/is-your-company-taking-enough-accountability-on-cybersecurity
Security

Are you taking enough accountability on cyber security?

18 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020