View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Survey says increased IT security spending is misplaced

The survey was carried on 110 companies from industries including financial services, government and high tech.

By CBR Staff Writer

Despite increased spending on security, the majority of organisations believe a database security breach would be the greatest risk to their business, according to a new Oracle sponsored research by CSO Custom Solutions.

Out of the 110 firms surveyed, about 66% said they adopt a security inside out strategy, while 35% base their strategy on end point protection.

Respondents from industries, including financial services, government and high tech, said that more than two thirds of their IT security resources remain allocated to protecting the network layer, while less than one third of the staff and budget resources were allocated to protecting core infrastructure like databases and applications.

According to the survey, 44% believe that databases were safe because they were installed deep inside the perimeter, while 59% plan to increase security spending in the next year.

The study found that in 35% of organisations, security spend was influenced by sensational informational sources rather than real organisational risks.

About 40% of respondents said that implementing fragmented point solutions created gaps in their security while 42% believe that they have more difficulty preventing new attacks than in the past.

Oracle chief security officer Mary Ann Davidson said IT Security has to focus attention on the most strategic assets.

Content from our partners
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline

"Organisations can’t continue to spend on the wrong risks and secure themselves out of business. When attackers do break through the perimeter, they can take advantage of weak security controls against the core systems by exploiting privileged user access, vulnerable applications, and accounts with excessive access", Davidson said.

"Organisations have to get the fundamentals right – which are database security, application security and identity management."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU