Special Report: Marketplace Security Survey, Risky Business - 41 and awareness (71.3 percent), information infrastructure (52.8 percent), personnel department background checks (52 percent), purchasing and acquisitions (38.5 percent), and IT department baseline documents (37.1 percent). See the results in Figure 5, page 40. Significantly, 82.2 of respondents have an information security policy or policies, 83.5 percent also have a monitoring and audit policy in place, and 73.8 percent regularly perform audits. Whether this referred to internal or external auditing wasn't addressed in the survey, but Sardino recommends regular internal and external audits. As he explains, "If you're the one who created the policies, you think they're wonderful. Having a neutral outsider look at security policy and controls can help organizations be more vigilant in fighting threats. You have to expect the policies to change, much as the threat landscape changes, which is fairly regularly. When you do make changes or updates, make sure they're implemented as soon as possible." The Good and the Bad Yes, the bad guys are out there, waiting for even the slightest security lapse to pounce. Organizations can take steps, however, to lessen those risks-employing encryption, promoting education for both system administrators and end users, and regularly auditing and updating policies. The one thing they can't do is become complacent. Threats are becoming evermore common and sophisticated, so no matter how good their current security plan is, it's likely to become outdated in short order. "You have your standard threats-phishing, spyware, malware-but thanks to automation, threats beyond those are becoming more dangerous. Unfortunately, many developers aren't taking the many ways someone can corrupt their applications into account. It's never going to stop. We need to more fully educate people and deploy the best tools we can," King says. Jim Utsler is a senior writer for IBM Systems Magazine and has been covering technology for more than 20 years. WEBINAR Sponsored Advertising Content Risky Business IBM Systems Magazine readers respond to exclusive 2016 z Systems Security Survey WHEN Tuesday, October 11 | 10 PT / Noon CT / 1 ET PART I: Learn how z Systems users are addressing security issues facing their organizations today and planning for and prioritizing future threats. PART II: CorreLog will provide insight to the security disconnect caused by enterprises working across the "two worlds of IT" (mainframe vs. distributed) and how to bridge the gap in this presentation titled "Bridging the Gap Across Mainframe and Distributed Platinum Sponsor: Security Policy Management." FEATURED SPEAKERS Doug Rock George Faucher Peter Mills Publisher IBM Systems Magazine President & CEO CorreLog, Inc. VP Development & Support CorreLog, Inc. REGISTER TODAY http://ibmsystemsmag.webex.com ibmsystemsmag.com SEPTEMBER/OCTOBER 2016 // 41 http://ibmsystemsmag.webex.com http://www.ibmsystemsmag.com Table of Contents for the Digital Edition of Special Report: Marketplace Security Survey, Risky Business Special Report: Marketplace Security Survey, Risky Business - 31 Special Report: Marketplace Security Survey, Risky Business - 32 Special Report: Marketplace Security Survey, Risky Business - 33 Special Report: Marketplace Security Survey, Risky Business - 34 Special Report: Marketplace Security Survey, Risky Business - 35 Special Report: Marketplace Security Survey, Risky Business - 36 Special Report: Marketplace Security Survey, Risky Business - 37 Special Report: Marketplace Security Survey, Risky Business - 38 Special Report: Marketplace Security Survey, Risky Business - 39 Special Report: Marketplace Security Survey, Risky Business - 40 Special Report: Marketplace Security Survey, Risky Business - 41 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910 http://www.ibmsystemsmagmainframedigital.com/MFSkills http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708 http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506 http://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304 http://www.nxtbook.com/nxtbooks/mspcomm/ibmsystems_mainframe_200901 http://www.nxtbookMEDIA.com
For optimal viewing of this digital publication, please enable JavaScript and then refresh the page. If you would like to try to load the digital publication without using Flash Player detection, please click here.