I’m not usually a complainer, but I’m tired of receiving security surveys. They’ve become almost like spam, and in some ways worse. For a variety of reasons, I’ve gotten to the point where I just delete the e-mails or throw the official-looking, color glossy ones in the trash. For loyal readers, I’ll get back to cyber ethics next time, but I can’t resist a short blog to complain about the number of IT survey requests we receive. Since I know I’m not the only one getting these, I thought I’d better express my concerns. Here’s a few points to ponder:1) Most of these come via e-mail from companies I’ve never heard of nor hear from again. Who’s to say these aren’t bad guys? They may claim to represent someone else, but ….2) They often ask very detailed questions about incidents, vulnerabilities, architectures, tools, etc. My thoughts: I’m not going to tell you that. I don’t even tell some internal people about that stuff. 3) They’re often marketing ploys to sell you something or get their foot in the door.4) Many times they offer you a free tee shirt, pen, or maybe even a $25 dollar Starbucks card. Please. Are you willing to give away “government confidential information” or even less important info for being entered into a drawing? Is this basically a sophisticated phishing technique? How many people bite? 5) Sometimes they try to make you feel special to lower your guard. They may even offer you an exclusive “white paper” or free research for your time. Consider this (slightly modified) e-mail: “Dear Colleague,XYZ Research is conducting a short 3 minute online survey to learn how IT Professionals like you are managing their desktop systems and security. For your participation in this research poll we will send you a free copy of the final report prepared by XYZ Research.We are only sending this invitation to a small group of thought leaders who are senior executives and who have been referred to us for participation.”I wonder how many people got the same message? Now the hard part. I realize that my attitude is not good news for the “serious survey information seekers,” like the CSI/FBI Computer Crime Survey. How are certain organizations going to get real numbers and industry metrics? How are the “Think Tanks” going to tell us about industry security trends if we don’t fill these out? There are exceptions, but not 1-2 a week! My view is that you’d better know who you’re dealing with, what they’re doing with the info, and how this affects your job. Your name and information may not really be anonymous. Even with numerous caveats, I still think the risks are often too high to fill these security surveys out. I now answer very few.I’d like to hear the vendor perspectives on these. Can we reach some type of truce? I doubt it, since CSOs are inundated with vendor e-mail and phone calls as well. I say these may be worse than spam, since they are more directed and sometimes require more thought before I hit the delete button. In reality, that’s now changing. I’d really like to hear how you deal with these surveys and your reasoning for filling them out or not. Related content opinion 3 security career lessons from 'Back to the Future' You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past. By Dan Lohrmann Jan 12, 2021 6 mins Careers Security interview Secrets of industry-hopping CSOs Who says you can't change industries? Veteran security leaders Mark Weatherford and Cheri McGuire teach you how it’s done. By Dan Lohrmann Mar 02, 2020 12 mins Careers Security opinion Why security pros are addicted to FUD and what you can do about it Despite professing anti-FUD rhetoric, cyber experts fan the flames, breathlessly sharing the details of the latest data breaches. It's a risky addiction that can lead to security apathy in enterprises. Here's how to harness it. By Dan Lohrmann Sep 06, 2018 7 mins Security opinion Bridging the smart cities security divide There are plenty of organizations that seem to be working on answers to secure smart cities, but in many ways it's like the early days of cloud computing with everyone building their own solutions. By Dan Lohrmann Feb 01, 2018 6 mins Internet of Things Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe