• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • More Than Half of Tech Companies Report Security Breaches

    June 26, 2006 Timothy Prickett Morgan

    High tech companies often talk a good game when it comes to security, but apparently the fact that they are heavily dependent on digital information and connectivity to the outside world means that they are susceptible to security breaches. And they are not doing a very good job protecting themselves.

    According to a report called Protecting the Digital Assets, which is based on surveys done by Deloitte Touche Tohmatsu of 150 companies in the technology, media, and telecommunications industries–so-called TMT firms–more than half of the firms said that they had security breaches of their systems within the prior 12 months.

    “When it comes to security, TMT companies are talking the talk but not yet walking the walk,” according to Brian Geffert, principal of Deloitte Security and Privacy Services, a unit of Deloitte Touche Tohmatsu. “Survey respondents say that security is a top concern, but it is still not being addressed across the organization from a risk-based perspective, despite recent breaches costing million of dollars of damage and inestimable harm to companies’ reputations, brands, revenue and productivity. In fact, more than half of security executives surveyed admit that their security investments are falling behind the threats or at best just catching up.”

    Geffert says that these digitally intense companies are still looking at security from the server and network perspective–with firewalls, antivirus, spam filtering, and encrypted virtual private networks being the norm. But people are storing sensitive information in laptops, PDAs, thumb drives, and iPods, and companies are not deploying systems that track information and how it flows around. Those surveyed said that they considered phishing to be a major threat, but only a quarter of the companies surveyed have implemented or begun piloting anti-phishing technologies. Only 37 percent of the companies polled had provided security training to employees in the prior year, and fewer than a quarter said that the security tools they have are being used effectively. Media companies in particular are freaked out. Consider that an estimated 70 percent of the movies released illegally onto file sharing networks were done by inside employees at the company.

    Deloitte Touche Tohmatsu did a similar survey of other industries, and the results will not make you feel very comfortable. If more than half the TMT companies reported breaches–about half were internal and half external–a whopping 78 percent of financial institutions reported a security breach in their systems in the prior year from the outside, up from 25 percent in the survey done in early 2005. About 49 percent of financial firms had a breach from the inside, up from 35 percent in the year-ago survey. (This is, after all, where money is stored, so you would expect more attempts to hack into systems.) About a quarter of life sciences and healthcare companies reported a breach in the prior year.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 15, Number 26 -- June 26, 2006

    Sponsored by
    ARCAD Software

    [Live Webinar] Rewrite your Synon in Java? It could be… a mistake!

    Converting from Synon CA 2E to a modern language? There are many good reasons to take this step. Beyond the critical shortage of Synon skills, applications developed in this 4GL environment can no longer take advantage of key technology advances in the IBM i operating system. And though a leader in its day, the Synon CASE tool is incompatible with modern DevOps practices and concurrent development.

    Do you think the best way to move away from Synon CA 2E is by rewriting everything in Java?

    Think again. A full rewrite is risky, expensive, and slow — often leading to years of redevelopment and countless functional regressions.

    Join Philippe Magne, CEO of ARCAD Software and Ray Bernardi, senior solution architect to learn why a conversion to Free Form RPG is a risk-free and high-performance option that leverages the architecture of the original Synon application – retaining all the reliability and security advantages of the host platform.

    In our Webinar, we will share a secure, automated migration path for business applications developed in Synon CA 2E:

    • 100% automated conversion to modern Free Form RPG and DDL (SQL)
    • Guaranteed conversion accuracy with test automation process
    • Possible modernization of the user interface during the project
    • Risk free, fixed price Modernization as a Service (MaaS)
    • Modern full DevOps framework for delivery

    Leverage the competitive advantage within your Synon application.

    Register Today!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Reader Feedback on Setting Library Lists Query/400 Handles Zero Dates (Sort Of)

    Leave a Reply Cancel reply

TFH Volume: 15 Issue: 26

This Issue Sponsored By

    Table of Contents

    • More Than Half of Tech Companies Report Security Breaches
    • IBM and Georgia Tech Push Silicon’s Speed Limit up to 500 GHz
    • CCSS Partners with eXystus Technologies in the Philippines
    • ASNA Invests in Spanish Distribution Partner CaCovai
    • IBM Lets BPs Offer Virtualization Test Drive to SMB Customers
    • More Than Half of Tech Companies Report Security Breaches
    • Survey Says CIOs to Boost Hiring in the Third Quarter
    • As I See It: The Great Disconnect
    • Readers React to Project Prometheus System i Effort
    • New Director of System i Sales for BPs, ISVs Appointed

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Stacking Up Power10 And Power11 Systems Price/Performance
    • Where Infor Is Headed With Its ERPs For IBM i
    • Rocket Delivers More DevOps Capabilities For IBM i
    • A Few More Power Systems Announcements Before Year End
    • IBM i PTF Guide, Volume 27, Number 46
    • Bang For The Buck On Entry Power10 And Power11 Machines
    • A Hardware Refresh Is The Perfect Time To Re-Evaluate Your HA/DR Strategy
    • Fresche Taps AI For New RPG-To-Java Conversion Tool
    • Gartner Raises 2025 IT Spending Forecast, Puts Out 2026 Prediction
    • IBM i PTF Guide, Volume 27, Number 45

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle