Competing Priorities Mean Security Risks for Small Businesses

  /     /     /  
Publicated : 23/11/2024   Category : security


Competing Priorities Mean Security Risks for Small Businesses


Small business IT professionals are trying to balance multiple priorities and finding that the balance often leaves the company with serious security risks.



IT professionals at small businesses face a number of competing priorities. Theyre generally individuals or small teams charged to to it all, from great customer user experience to company security. And 98% think the employees at their companies could be doing more to help on the security front.
A new report, based on a survey sponsored by LastPass and conducted by Vanson Bourne, finds competing priorities lead to competing objectives for improving security. Among their security objectives for the coming year, more than 50% of the 700 professionals who responded to the survey cited securing data (75%), securing new technologies as theyre adopted (68%), reducing risk (66%), and upgrading identify access management (65%).
All of those, and especially identity management, are made more difficult because of all the other requirements these all-purpose IT professionals need to balance. Forty-seven percent say they have to balance ease of use against security, while 37% cite employee demands for greater ease of use as a competing requirement.
The critical nature of finding the proper balance is illustrated by another finding, that 82% of respondents say their businesses have been exposed to a risk as a result of poor identity and access practices.
Read more 
here
.
 
Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the 
conference
 and 
to register.
 
 
 
 

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Competing Priorities Mean Security Risks for Small Businesses