Skills are key to plugging IT security gaps

May 2003
IT Training;May2003, p16
Trade Publication
Staff training is the best way to reduce security risks, according to two studies conducted by the BCS and Comptia. The reports suggest that human error and internal fraud are the main causes for most security breaches. Both can ameliorated by raising staff awareness. The BCS/Henley Management survey found that 72 per cent of IT managers regard internal fraud as a greater threat than service failures or confidentiality breaches.


Related Articles

  • Keeping it simple. Dickerson, Chad // InfoWorld;3/31/2003, Vol. 25 Issue 13, p48 

    Presents information on the result of a study conducted by the Computing Technology Industry Association regarding company security breaches in the U.S. Percentage of human errors as a cause of security breaches according to the study; Examples of human errors; Approach to reducing human error...

  • IT Still Largely Responsible For Cyber Risk, Study Finds. McDonald, Caroline // National Underwriter / P&C;10/24/2011, Vol. 115 Issue 38, p13 

    The article focuses on the results of the survey "A New Era in Information Security and Cyber Liability Risk Management," sponsored by Zurich Financial Services Group, which show that 57.2 percent of respondents believe that corporate information technology (IT) departments are responsible for...

  • Youthful Indiscretion. Alter, Allan // CIO Insight;May2007, Issue 81, p25 

    The article discusses the youthful indiscretion concerning information technology security problems in the U.S. A survey conducted by the National Cyber Security Alliance indicates that young adults are less discrete in dealing with social networking than older workers. Another study conducted...

  • Tech Terms Keep Consumers From Embracing Security Measures.  // AirGuide Online.com;3/1/2010, p7 

    The article informs that the information technology workers helps the consumers in retaining security measures and explain security threats to them..

  • Baked And Wired. Holmes, Allan // Government Executive;Mar2010, Vol. 42 Issue 3, p8 

    The article focuses on the development of security of information technology systems.

  • IT and Physical Security: A Welcomed Partnership?  // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p14 

    The article reports that a survey released by Honeywell International Inc. reveals how organizations are integrating physical infrastructure security with information technology (IT) security. More than 50 chief information officers and chief security officers in U.S.-based global companies with...

  • Ready or Not: The Game Is Coming to You. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;May2007, Vol. 44 Issue 5, p10 

    The author reflects on the trends in the security solutions for enterprise security leaders. He cites the convergence of information technology (IT) and security professionals to create a new generation of security strategy and execution. He also explores the annual surveys that involve...

  • Sault sees security as future strength. Ross, Ian // Northern Ontario Business;Nov2003, Vol. 23 Issue 13, SAULT STE MARIE p1B 

    Reports on the initiatives of the Secure Community Sault Sainte Marie related to the emerging information technology (IT) security market in Sault Sainte Marie, Ontario. Fundamental components involved in the initiative; Possibilities in the city's biotechnology cluster in relation to...

  • Influencing Factors and Control of Management Information System Security in Furniture Enterprises. Qiumei Zhang // Information Technology Journal;2014, Vol. 13 Issue 4, p1 

    Under the drive of the booming development of information technology, some furniture enterprises construct Management Information System (MIS) to acquire competitive advantages. But automated data information seems more vulnerable in the face of destroy, fraud, error and abuse. When a computer...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics