The race to adopt new technologies and integrate cloud computing could begin to compromise security as new business needs drive innovation, according to Ernst & Young’s Global Information Security Survey.

 

According to the report, which surveyed more than 1,7000 organisations,  76 per cent of respondents believe there is a growing risk associated with external threats, while only 42 per cent reported updating their information security strategy in the last 12 months.

 

“We may have thought the pace of change in technology couldn’t possibly move any faster, but with the adoption of new technologies occurring at lightning speed, so too rises the threat of security breaches on a global scale,” Mike Trovat, Ernst & Young’s Information Security Leader said.

 

Mr Trovato said while Australian organisations were slower on the uptake of integrating mobile devices into business-as-usual, they were adopting cloud technologies at a faster rate than their global counterparts.

 

“Only 28% of Australian organisations are currently using mobile tablets with 53% evaluating or adopting very limited use of the devises for business purposes. This is in stark contrast to 80% of organisations globally already using tablets,” Mr Trovato said.

 

Mr Trovato said more Australian organisations (69% versus the global result of 61%) were already using or considering the use of cloud computing services within the next year, but preparing business against the threat of security breaches was ranking much further down the priority list.

 

“On the flip side, Australians place more importance on ensuring technology supports business continuity than the rest of the world with half of all respondents spending more in this area.

 

“While this is the unfortunate consequence of the devastating natural disasters experienced in Australia over the past 12 months, this means we are acutely aware of and focusing on business continuity,” Mr Trovato said.

 

The survey found the following funding results:

  • Nearly 60% of respondents plan on increasing their information security budgets in the coming 12 months. However, less than half (48%) of respondents stated that they have a documented information security strategy.
  • Identity and access management technologies are a top information security funding priority for the coming 12 months, followed by data leakage.
  • Overall, for the second consecutive year, respondents have indicated that business continuity is their top funding priority, and their strategies are continuously updated, tested and approved by management.