UK firms fear their data is not safe from cyber attacks

Companies also admit their perimeter security won't fend off hackers

UK companies fear their data will not be safe in the event of a data breach, according to a survey.

Two-thirds of firms said perimeter security systems deployed in their organisations were effective, but 69 per cent were not confident that data would be safe if systems were breached, Gemalto's study of 1,100 IT decision makers worldwide found.

Advertisement - Article continues below

In the UK, 97 per cent of UK companies admitted their perimeter security systems are ineffective at keeping unauthorised users out of their network and only seven per cent of UK respondents were extremely confident their organisation's data would be secure if their perimeter was breached.

Around 66 per cent believed hackers can access their network and nearly two in five said criminals could access their entire network.

"This research shows that there is indeed a big divide between perception and reality when it comes to the effectiveness of perimeter security," said Jason Hart, vice president and chief technology officer for data protection at Gemalto.

"The days of breach prevention are over, yet many IT organisations continue to rely on perimeter security as the foundation of their security strategies. The new reality is that IT professionals need to shift their mindset from breach prevention to breach acceptance and focus more on securing the breach by protecting the data itself and the users accessing the data."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

According to the research, 78 per cent of respondents said they had adjusted their strategies as a result of high-profile data breaches, up from 71 per cent in 2015 and up 53 per cent in 2014. More than four in five respondents increased spending on perimeter security and 85 per cent believe that their current investments are going to the right security technologies.

"While companies are confident in the amount of spending and where they are spending it, it's clear the security protocols they are employing are not living up to expectations," said Hart.

"While protecting the perimeter is important, organisations need to come to the realisation that they need a layered approach to security in the event the perimeter is breached. By employing tools such as end-to-end encryption and two-factor authentication across the network and the cloud, they can protect the whole organisation and, most importantly, the data."

Advertisement

Recommended

Visit/security/vulnerability/355236/hp-support-assistant-flaws-leave-windows-devices-open-to-attack
vulnerability

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020
Visit/security/cyber-security/355234/safari-bug-let-hackers-access-cameras-on-iphones-and-macs
cyber security

Safari bug let hackers access cameras on iPhones and Macs

6 Apr 2020
Visit/software/video-conferencing/355229/zoom-we-moved-too-fast
video conferencing

Zoom CEO admits company "moved too fast" as privacy issues mount

6 Apr 2020
Visit/security/internet-security/355228/mozilla-fixes-two-firefox-zero-days-being-actively-exploited
internet security

Mozilla fixes two Firefox zero-days being actively exploited

6 Apr 2020

Most Popular

Visit/development/application-programming-interface-api/355192/apple-buys-dark-sky-weather-app-and-leaves
application programming interface (API)

Apple buys Dark Sky weather app and leaves Android users in the cold

1 Apr 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020
Visit/security/privacy/355211/google-releases-location-data-to-showcase-effectiveness-of-coronavirus
privacy

Google releases location data to show effectiveness of coronavirus lockdowns

3 Apr 2020