According to the survey of 100 IT and security managers at U.S. defense contractors published today, 39% indicated that part of the Snowden fallout has been that their own access privileges have been made more restricted than before.
In addition, more than half said there have been reviews and re-evaluations of all employee data access privileges as well. The survey study, published by ThreatTrack Security, said 62% of these IT and security managers feel their organizations remain vulnerable to cyber-espionage, as well as malware-based advanced persistent threats.
The defense contractors participating in the survey often have substantial IT security budgets, with one quarter of them saying their budgets ran $1 million to $10 million, and another 23% with budgets exceeding $10 million. Those IT and security managers with the highest budgets expressed the most worry about advanced malware attacks.
More than a quarter of the survey’s respondents said their staff doesn’t have enough highly skilled IT security experts, including malware analysts. However, a quarter of respondents expressed confidence in the methods they use to detect malware and cyber-espionage.
Another ‘Snowden effect’ is that defense contractors are apparently changing how they hire and train employees who handle sensitive information. More than half of the survey’s respondents said cyber-security awareness training has accelerated. Nearly half said they have instituted more monitoring of online behavior of employees. However, 23% said “nothing has changed” since the Snowden affair hit the news.
Click headline to read more–
Changes underway due to potential security breaches related to the IT space. Defense contractors paying a lot more attention to malware and its associated (potential) threats.