Access your Pro+ Content below.
Perspectives: Pet information security risks
This article is part of the Information Security magazine issue of January/February 2010
According to a published report, seven out of 10 companies overspend on IT security expenses without improving security or becoming compliant. What causes this phenomenon? Isn't overspending on security a good thing? The cause is the introduction and promotion of "pet" risks by decision makers. A pet risk is a threat, vulnerability, or product that solves an apparent problem in the minds of IT or security managers. It's their favorite issue, consuming all their attention and therefore, requiring an overabundance of resources to mitigate. In what is a common occurrence for many large organizations, decision makers get in their minds that they need a specific product to prevent what they perceive is an information security risk. IT and security leaders in the organization spend many dollars and hours to get solutions in place to mitigate their pet risks. However, the return on security investment (ROSI) isn't readily apparent and often, the expense isn't worth the apparent risk. It's like a person who's so fearful of having their ...
Access this PRO+ Content for Free!
Features in this issue
Massachusetts 201 CMR 17.00 and Nevada's data protection law establish new standards for personal data protection
Learn how endpoint data loss prevention technology complements network DLP and secures data that users interact with on laptops, mobile and portable storage devices.
Disaster recovery plans, DLP solutions, and regulatory compliance are top enterprise priorities, according to Information Security's Priorities 2010 survey
Secure coding and vulnerability scanning could mitigate many Web application attacks
Columns in this issue
IT and security managers often make the mistake of being consumed with a specific risk or threat to the detriment of security
Security experts Bruce Schneier and Marcus Ranum debate the possibility of eliminating anonymity on the Internet.
China's hacker attacks against Google's infrastructure, including Gmail accounts of human rights activists as well as Google's source code, should be used to educate enterprises about the reality of cyberespionage from nation states and organized criminals.