Palo Alto Networks: cybersecurity education paying off
Survey conducted by company found a significant rise in threat awareness amongst C-level executives.
Security specialist Palo Alto Networks recently released a survey highlighting the impact of cybersecurity education among 765 business decision-makers with businesses across Europe.
Conducted in collaboration with Redshift Research in October 2015, the survey included respondents from UK, Germany, France, the Netherlands and Belgium.
Conclusions drawn from the showed a heightened increase in awareness amongst respondents of cybersecurity threats. In fact, roughly 61% of participants reported that they would seek out input from their respective IT department, before introducing foreign devices to the network.
Additional findings showed that adherence to cybersecurity policies on the introduction of new devices were primarily driven by personal views on technology. Those that previously ignored the company's cybersecurity policy in the past were typically found to be motivated to use they perceived to be a more efficient tool or service.
While largely positive the survey also found that business managers with the salary to be early adopters of technology, were 39% more likely to bypass the company's cybersecurity policy.
Of that group, one in eight would not inform anyone of introducing a new device into the environment, or implementing corporate tools onto unsecured devices.
Commenting on the survey findings, Greg Day, VP and regional CSO, EMEA at Palo Alto Networks shared: "BYOD is now a mature concept, but many still struggle to manage the blurry lines between personal and business data access by personal devices."
He added: "Many organisations have deployed solutions to manage devices, but the anxiety comes from their broad connectivity, especially as the boundaries between business-driven cloud services and personal ones become less clear, which creates unknown bridges between business networks and the Internet at large. Modern state-of-the-art security must be able to prevent any device communication becoming the point of a breach and minimise risk for an organisation."