itb-nz logo
Story image

Businesses ignoring security when investing in new tech

Only a quarter of organisations are prioritising security when it comes to technology investment, according to a new report by Advanced. 

As businesses strive towards digital transformation, these findings come as a blow as separate reports show cyber attacks continue to hit firms hard, suggesting that security is being ignored, the company says.

The report also reveals only a third (34%) admit that regulatory change is triggering the purchase of new technology in their organisation, which is surprisingly low given the introduction of the General Data Protection Regulation (GDPR) in May last year, Advanced says.

Justin Young, director of security and compliance at Advanced, says the GDPR should have been a wake-up call for organisations to better protect their customers personal data.

"Why, then, are so many businesses still failing to take security seriously?," Young says. 

"Information security is important not only because it can improve customer confidence, support good data governance and demonstrate compliance with the GDPR, but also because it is actually a key driver to achieving successful digital transformation," he explains. 

"In fact, no technology should be implemented without understanding its security implications."

Yet, according to Advanced's report, only 53% currently have a security strategy in place.

"It perhaps comes as no surprise, then, that security concerns are holding more than a third of businesses back from achieving a successful digital strategy," Young says.

While it's unclear from the research what the concerns and barriers are, a large number of reports do suggest a skills shortage could be to blame. The latest (ISC) Report, for example, finds that 63% organisations have a shortage of IT staff dedicated to cyber security with 59% at moderate or extreme risk of cyber security attacks as a result.

"What is clear, however, is that organisations need to act now," says Young. 

"They need to work out what skills they do have in-house to manage the basics (and then, if needed, work out what to outsource) and prioritise raising awareness across the rest of the workforce," he explains. 

"Ultimately, every cyber security strategy must start with educating people that a company's data is sensitive and this education must not stop. This means IT and security leaders continually need to ensure a culture of responsibility is adopted at all levels."

Story image
How 'data gravity' centres can spell trouble for enterprises
In the not-too-distant past, data was created in a much more centralised place, and users and systems had far less access to it. Now, with digital data from social, analytics, mobile, cloud, IoT and more being created with both simultaneity and omnipresence, so much information is being collected that it’s forming a ‘centre of gravity’.More
Story image
IDC: Digital infrastructure will be the catalyst for success post-pandemic
If organisations properly apply the key digital infrastructure tenets - technology adoption and IT governance - then revenue growth and business expansion will soon follow, according to the research.More
Story image
iText provides open source PDF tech for developers & business users
iText provides versatile open source PDF technology for developers and business users – from PDF libraries to low-code products.More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More
Story image
Interview: How iText adapts to the evolution of open source & PDF
“We are unique in the way that we have not built in any limitations to the capabilities of our open source technology when compared to our commercial offering.”More
Link image
Six ways you can clean up sprawling document workflows
Lost in a digital document sprawl? iText shares some quick PDF pointers to help your business to create a clearer path to better workflows. Read more here.More