If you knew that burglars were operating in your neighborhood, that they possessed technology rendering the locks on your home useless, and that affordable lock technologies that provide better protection were available, what would you do? Most people would change their locks ASAP. But many companies bring a different sensibility to bear when it comes to information security.There is plenty we can do to improve our security, even if perfect protection is an illusion. And much help is available. But survey data by Cutter Consortium suggests that too few companies are buying new information security locks.It’s not as though no one is paying attention. The data from the Cutter survey shows that a majority of companies are acting on the information security threat. But the data reveals disturbing details as well: A surprisingly large number of respondents don’t think the security of their IT infrastructure is all that important. Unrealistically large numbers of respondents believe that they have not yet been attacked, which probably indicates that they have been and do not realize it. Too many respondents select the “middle numbers” (i.e., 3 on a scale of 1 to 5) in characterizing their current security or level of threat, which may indicate a lack of detailed knowledge about security issues. Too many respondents “don’t know” the level of security within their organization, indicating a lack of awareness. Too few companies are making use of significant countermeasures, such as compartmentalization of IT infrastructure into zones. Too few companies are paying adequate attention to change control.This last point is especially troubling. According to the survey results, only 48% of companies stringently control the applications that are installed on corporate computers. Although this survey question was perhaps too narrow (it asked about “all corporate computers” and added “keeping [applications] to a bare minimum”), change control keeping close account of exactly what runs on corporate computers and what should run on corporate computers is nevertheless an absolute necessity in determining whether an attack has occurred, what kind of attack it was, and what must be done in response. This is more than a technical issue. If you don’t know what has happened after you’ve been attacked, you may not know what needs to be disclosed to the public, to your customers, or to law enforcement. Change control is the basis of solid forensics, and it’s necessary if an enterprise is to press charges against attackers. Furthermore, change control includes patch management: ensuring that recent security fixes issued by vendors are promptly applied. This is important because when fixes are released, hackers immediately set out to understand the threat that the fix is intended to address and to create new attacks that work against those who are slow to apply the fix. Attacks against recently announced vulnerabilities usually appear within days of a patch release.A failure to keep track of what ought to run on your systems is also simply operationally sloppy. This kind of sloppiness should be no more acceptable to responsible companies than is sloppiness in tracking inventory or cash in a company’s bank account. When we stop thinking about information security as an esoteric problem and start thinking about it as an operational challenge that responsible companies must manage, we’ll approach the right level of awareness. Unfortunately, according to the survey results, only a subset of companies are recognizing this. Related content news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Cybercrime Security news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Government Security Practices news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe