September 6, 2016 By Larry Loeb 2 min read

The Ponemon Institute published a recent study that evaluated the way end users and security teams approach IT security policy. The study analyzed input from 1,371 users and 1,656 security professionals in various industries located in the U.K., U.S., France and Germany.

A Widening Gap

The report found a gap between end users and IT pros that has only widened over time. Specifically, 35 percent of end users said their organizations enforce their own internal data security policies, while 52 percent of IT pros believe those same data security policies are being enforced.

Not only that, but 61 percent of the respondents working in IT or security roles viewed the protection of critical company information as a “very high” or “high” priority. This greatly differs from what the study found in end users’ attitudes: Only 38 percent of end users considered it a high or very high priority to protect this kind of data. This seems to suggest that many end users lack a sense of awareness about data and its value.

Productivity Trumps IT Security Policy

Interestingly, productivity enters into the enterprise security equation. The Ponemon Institute study found that 38 percent of IT practitioners, as well as 48 percent of end users, felt that their companies would allow some sort of additional risk to the security of corporate data for the benefit of productivity.

Looking at specific data security policies, 39 percent of end users said they had taken all appropriate steps to protect the company data that they use within the course of their jobs. On the other hand, 52 percent of IT practitioners said employees in their organizations take the appropriate steps to protect this type of data.

An Alarming Decline

“At a time when one would expect general improvement in end-user hygiene due to increased awareness of cyberattacks and security breaches, this survey instead found an alarming decline in both practices and attitudes,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, as quoted by SC Magazine.

Sometimes, the very policies that should address a problem may exacerbate it. If the users and the IT folk feel so differently about the effects of security policies, it may be time to take a long hard look at how current policies are implemented and what can be changed to increase both user awareness and compliance.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today