Competing Priorities Mean Security Risks for Small Businesses

  /     /     /  
Publicated : 23/11/2024   Category : security


Competing Priorities Mean Security Risks for Small Businesses


Small business IT professionals are trying to balance multiple priorities and finding that the balance often leaves the company with serious security risks.



IT professionals at small businesses face a number of competing priorities. Theyre generally individuals or small teams charged to to it all, from great customer user experience to company security. And 98% think the employees at their companies could be doing more to help on the security front.
A new report, based on a survey sponsored by LastPass and conducted by Vanson Bourne, finds competing priorities lead to competing objectives for improving security. Among their security objectives for the coming year, more than 50% of the 700 professionals who responded to the survey cited securing data (75%), securing new technologies as theyre adopted (68%), reducing risk (66%), and upgrading identify access management (65%).
All of those, and especially identity management, are made more difficult because of all the other requirements these all-purpose IT professionals need to balance. Forty-seven percent say they have to balance ease of use against security, while 37% cite employee demands for greater ease of use as a competing requirement.
The critical nature of finding the proper balance is illustrated by another finding, that 82% of respondents say their businesses have been exposed to a risk as a result of poor identity and access practices.
Read more 
here
.
 
Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the 
conference
 and 
to register.
 
 
 
 

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Competing Priorities Mean Security Risks for Small Businesses