• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • LOGIN
  • Law Office ManagerHOME
  • Book StoreBook Store
  • WebinarsWebinars
  • LOGIN
  • Manage Your Account
  •  
Law Office Manager

Law Office Manager

  • Hiring
  • Increasing profits
  • Technology
  • Billing
  • Managing staff
  • More! ⇩
    • Newsletter Archive
    • Time tracking
    • Client relations
    • Termination
    • Tool Box
    • Risk management
    • Recordkeeping
    • Cartoons
    • Reader tips
    • Purchasing & leasing
    • Marketing
    • Managing the office
    • Information security
    • Your career
    • Working with lawyers
    • Employee benefits
    • Compliance
    • Workplace Safety
  • Special Reports

Are you changing your security strategy?

May 1, 2015

The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment that’s challenging for even the best prepared organizations, according to new research recently released by CompTIA, the IT industry association.

“It’s not that businesses need to be convinced that security is important,” said Seth Robinson, senior director, technology analysis, CompTIA. “Instead, they need to be convinced of the ways that their current security approach is putting them at risk.”

In the new CompTIA study Trends in Information Security companies identify a series of factors that are complicating their security readiness.

The growing organization of hackers (cited by 54 percent of firms), the sophistication of threats (52 percent) and the greater availability of hacking tools (48 percent) carry implications for business. Attacks can be more dynamic, changing rapidly and targeting with greater efficiency.

Just over half of the companies surveyed (52 percent) say greater interconnectivity has complicated their security. As organizations have embraced cloud computing and mobile technology solutions, they have extended the security perimeter, creating new security considerations. Legacy security systems and practices are often not sufficient to protect the expanded perimeter.

Robinson identifies three areas where organizations are changing their security posture: technology, processes and personnel.

Companies are bringing in new security technologies to go along with the new business technologies they’re using. Data loss prevention (DLP) is one of the most common new tools, currently is use by 58 percent of companies. Identity and access management (IAM) and security information and event management (SIEM) both showed strong growth in adoption, at 57 percent and 49 percent, respectively.

But technology is only one component of the new security approach. Processes must be considered, and the best place to document process decisions is in a formal security policy. Yet only half of all companies believe they have a comprehensive security policy in place.

One process that more companies need to focus on is a formal risk analysis. Compared to 2013 data, fewer firms feel that they have the appropriate balance between risk and security, a viewpoint shared evenly across all company sizes.

The Trends in Information Security reveals that malware and hacking are still the top threats causing concern, with nearly half of all companies citing these as serious concerns. The human element in security is still present, too.

“Though human error ranks low as a serious concern, companies report that it is the largest factor behind security breaches,” Robinson said.

With regard to human error, more training is the clear answer, but companies struggle with understanding how to make an investment in training that will pay off. Only 54 percent of companies offer some form of cybersecurity training.

The complete report is available to CompTIA Premier Members and Registered Users at http://www.comptia.org/resources/trends-in-information-security-study.


Related reading:

How to Protect Your Data against Costly and Destructive Cyber Attack


How to do staff training that really works


Model Policy: Employee computer use and social networking


Filed Under: Topics, Information security, Managing the office, Technology, articles Tagged With: Information security, Technology, General, Managing the office

Primary Sidebar

Free Reports

    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying

Free Premium Reports

    • 7 Smart Cost-Cutting Strategies for Your Law Office
    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying
    • 7 Proven Ways to Make Your Billing and Collections More Profitable
    • 7 Simple, Proven Steps to Hiring the Right Staff
    • 7 Policies Every Law Office Should Have

Download Current Issue

Current Issue

Recent Headlines

Make Every Minute Count: Best Practices for Year-End Timekeeping and Billing

Law Graduates of Color, First-Gen Students Lag in Jobs, Salaries Despite Strong Market

Supporting Law Firm Partners and Protecting the Practice: Addressing Alcohol Concerns with Care

How to Unplug from Work Over the Thanksgiving Holiday

Law Office Data Security and Privacy Audit Checklist

Your Career

How to Unplug from Work Over the Thanksgiving Holiday

What to Do If You’re the One Who’s Always Late

Big Changes: How to Navigate a Law Office Merger

Shifting Towards Alternative Fee Arrangements

Tick Those Unpleasant Tasks Off Your To-Do List

Deliver Your Message

Footer

Return to the Top

Download the Current issue
Monthly Magazine Archive
Advertise in Law Office Manager
Download Media Kit

Become a Premium Member
Download a Sample Issue of LOM
Renew your Law Office Manager Membership
Manage Your Account
Contact Law Office Manager
About Law Office Manager
Terms & Conditions
Privacy Policy
Give Us Feedback


Copyright © 2025 Plain Language Media, LLLP • 1-888-729-2315