73% of companies believe they are vulnerable to hacking
External vs Internal
A third of respondents believe that buying external applications pose a greater security threat than writing them in house. That said, thirty five percent don't consider checking externally procured applications for flaws and vulnerabilities. When examining how concerned respondents were about application security, fifty five percent of respondents disclosed they were worried because it hadn't been made a priority for the developers. A further twenty one percent were rightly disturbed because it is at the bottom of everyone's mind.
Barmak Meftah, Senior Vice President Products & Technologies, from Fortify Software said "Although pleased by a reduction in respondents who admit their software applications are vulnerable to attack, eight percent simply isn't good enough. Today, such an informed audience shouldn't be citing security concerns as bottom of anyone's mind or worse not considered a priority. Businesses really should be looking to alleviate the security risks in their applications and achieve software security assurance so that they don't have to face the expense and embarrassment of being hacked."
The survey also confirms that the economic downturn is having an impact on organisations' security with twenty three percent reporting an increase in hacking attempts since the economy went into freefall.
Twenty six percent have been victim to at least one instance of hacking in the last twelve months.
The Fortify Application Security Survey was first carried out at Infosecurity Europe 2008 amongst 300 IT security professionals, who were drawn from mainly 1000+ employee sized companies and repeated at this years event amongst 282 visitors.
Press releases you might also be interested in
Weitere Informationen zum Thema "Security":
Mehr Cybersicherheit in Europa
2017 veröffentlichte die Europäische Kommission ihre Cybersicherheits-Strategie und viele Sicherheitsexperten unterstützten nachdrücklich jede Anstrengung, deren Ziel es ist, die Abwehr von Cyberattacken zu stärken. Durch den täglichen Umgang und die Erfahrung mit IT-Sicherheit, hat auch IBM eine klare Vorstellung davon, wie allgemein verbindliche Richtlinien aussehen sollten, um tatsächlich wirksam zu sein.Weiterlesen