3501350644_0cf3caebac_o

Ever since Snowden’s release of reports of NSA spying last June 2013, people increased their concerns about their security online. However, that wasn’t the only case that made the people aware of their security and privacy. In 2014, there was numerous violation done to people’s security and privacy not only by the NSA but also from big-name companies like Home Depot and Target. Celebrities even were affected with the various spying and hacking when many of their private photos were leaked when iCloud was hacked.

These events definitely made changes to companies and there view on their security measures. Tech Pro Research made a survey on this and this was the result:

  • About two-thirds of the respondents said they were more concerned with security after media news reports of breaches and leaks. However, only large organizations with more than 1,000 employees were planning to improve IT security controls. Smaller companies were lagging behind in the implementation of IT security controls.
  • Small and medium-size businesses were either keeping the same budget in 2014 or increasing it. Meanwhile, more large organizations were decreasing their security budget for 2014, but the survey showed that security management outsourcing and maturing security programs are the likely reasons for this decrease.
  • One of the top concerns for businesses for 2014 was the Bring Your Own Device (BYOD) movement. Lack of employee awareness in regard to social engineering attacks was the number one concern in 2013 but moved to second place for 2014, with BYOD taking the top slot.
  • Projects slated for 2015 indicated a continuing shift from security best practice management to information assurance management. The survey showed that 50% of respondents were focused on improving risk management processes in 2014, linking information resource protection to business objectives. This tends to move perspective from implementing best practices to designing security frameworks best suited for strategic and operational business plans.

If you want to be part of the research you can click here. Joining the research entitles you a copy of their full report.

A Survey on Security Projects and Concerns
Tagged on:         

Leave a Reply

Your email address will not be published. Required fields are marked *