Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.
  • 19 June 2017 14:58

Australian organisations not setup to predict the risk of security breaches before they occur

Study by CA Technologies reports majority of Australian organisations believe security breaches have increased in last 12 months

SYDNEY, 19 June, 2017 – Australian organisations are lagging behind their regional counterparts when it comes to having security controls that are adaptive based on risk, with few able to anticipate the risk of a breach before it occurs.

This highlights a significant disconnect with the fact that more than half of Australian organisations believe that the number of security breaches has increased in the last 12 months.

In a global study by CA Technologies; The Security Imperative: Driving Business Growth in the App Economy, a low 37 per cent of Australian organisations reported employing proactive or predictive processes to detect data breaches; a stark comparison to our regional counterparts in Singapore, (75 per cent) and Korea (60 per cent). Further, 21 per cent of Australian organisations say that their approach to detecting data breaches only includes an ‘occasional review of activity reporting’.

“There’s no doubt that good identity-centric security strategy helps a business to accelerate its digital transformation journey. With data breaches becoming more frequent and more mature, identity-centric security needs to be incorporated right from day one, as a core technology enabler rather than bolted on as an IT afterthought,” said Teng Sherng Lim, vice president, Security, CA Technologies, Asia Pacific and Japan.

When it comes to identity and access management (IAM), none of the Australian organisations surveyed said their controls are adaptive based on risk, with the majority of controls being centralised or automated (67 per cent) and the remaining 33 per cent employing manual controls.

A correlation can be drawn between these figures and the impact of IT security efforts on business KPIs with Australia’s results again, by-and-large below the regional average. In particular, the areas of employee productivity (37 per cent), customer satisfaction (40 per cent), operational efficiency (35 per cent) and importantly business growth (41 per cent) paint a picture of little improvements.

“Disruptions – and in this case security breaches – are coming to every industry. For Australian organisations to succeed and in fact last, they need to be built it to change. This means not only keeping up, but constantly innovating and continuously improving. Employing advanced identity-centric security isn’t optional, it’s imperative,” said Lim.

The number of compliance audit failures was also reported to have improved by only 35 per cent based on IT security efforts, which compares starkly to Thailand at 57 per cent.

On a regional level, those with advanced identity-centric security reported a 35 per cent decrease in breaches, compared to only 12 per cent of basic users. Additionally, advanced users of identity-centric security that have seen a decline in breaches have been much more proactive in preventing breaches through increased investment and focusing on mobile devices and apps.

The study polled 1,770 senior business and IT executives worldwide, of which more than 100 are chief security officers and chief information security officers. 799 of the respondents were from countries in the APJ region.

-ENDS-

Resources

• The Security Imperative: Driving Business Growth in the App Economy

• The Security Imperative Infographic

About the Research/Coleman Parkes

Conducted by Coleman Parkes, the study included 1,770 senior business and IT executives, including more than 100 CSOs and CISOs, from large enterprises across 21 countries and 10 industry sectors. The study and data analysis was done from May – September 2016. Coleman Parkes Research Ltd, formed in 2000, provides action-focused marketing research on a global scale. The company offers a full research and consultancy service across all markets, while specialising in business-to-business research with a focus on IT, technology and communications research. For more information, please visit www.coleman-parkes.co.uk.

About CA Technologies

CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com.

Legal notices

Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

Media contact

Belinda Truong Hill+Knowlton Strategies Ph: 02 9286 1243 M: +61 401 384 693 E: Belinda.truong@hkstrategies.com

Submit a media release

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place