CISO Survey: End Users See Security as a Hurdle to Innovation

Oct. 23, 2017
Traditional approaches to security are leading to frustrated users and strained relationships between workers and IT departments, according to the findings of a CISO survey. About three-fourths (74 percent) of CISOs say end users are frustrated that security disrupts productivity and 81 percent say end users see corporate security policies as a hurdle to innovation.

Traditional approaches to security are leading to frustrated users and strained relationships between workers and IT departments, according to the findings of a survey of chief information security officers (CISOs). About three-fourths (74 percent) of CISOs say end users are frustrated that security disrupts productivity and 81 percent say end users see corporate security policies as a hurdle to innovation.

The findings are from a CISO survey conducted by Bromium, Inc., a Cupertino, Calif.-based security software company. The research, based on a survey of 500 CISOs from large enterprises in the US (200), UK (200) and Germany (100), is part of a wider report, called “The CISOs Dilemma: Security Versus Productivity,” on the role of the end user in cybersecurity.

The research revealed most security teams utilise a ‘prohibition approach’—i.e. restricting user access to websites and applications—a tactic which is hampering productivity and innovation while creating major frustration for users.  

Key findings from the survey include:

  • 88 percent of enterprises prohibit users from using websites and applications due to security concerns; with 94 percent investing in web proxy services to restrict what users can and can’t access
  • Unsurprisingly, these restrictions negatively impacts user experience: 74 percent of CISOs said users have expressed frustration that security is preventing them from doing their job and 81 percent said that users see security as a hurdle to innovation 
  • 77 percent of CISOs feel stuck trying to keep the organization secure while enabling innovation
  • Worryingly, security could also be impacting customer’s relationships and deals, as CISOs report that they get complaints at least twice a week that work has been held up by over-zealous security tools
  •  As a result, IT help desks are spending an average of 572 hours a year responding to user requests and complaints regarding access to websites

All this frustration is creating an uneasy relationship between IT, security and the user, according to the report authors. Seventy-one percent of CISO respondents said that they are being made to feel like the bad guys, because they have to say ‘no’ to users requesting access to restricted content.

“At a time when competition is fierce, the risk of falling behind and being less productive is as big a risk to an enterprise as cyberattacks. Security has to enable innovation by design, not act as a barrier to progress. Sadly, traditional approaches to security are leading to frustrated users, unhappy CISOs and strained relationships between workers and IT departments—all of which stifles business development, innovation and growth,” Ian Pratt, president and co-founder of Bromium, said in a statement. “This is unacceptable in a world where time to market is a vital driver for business success. We need to put an end to this catch-22 between security, productivity and innovation—things need to change.”

At the same time, 99 percent of CISOs surveyed believe end users are the last line of defense against hackers and virtually every CISO believes that user education, policies and procedures are essential to ensuring employees understand their role in keeping the business secure.

The survey also found that 94 percent of CISOs have pushed for increased investment in user education following recent headlines around phishing and ransomware.

However, this education, alongside strict policies and procedures and restricted access to websites and applications, is leaving employees feeling exasperated. In fact, 74 percent of CISOs told us that employees in their organization had already expressed frustration at the way these policies were hampering their productivity.

To calculate the cost of employee security training and education, the researchers asked CISOs how much time employees are spending on this in their organization. The report found that the average employee now spends 7 hours per year in security training and learning processes. For an organization that employs 2,000 people this equates to a cost of $290,033 in terms of lost productivity.

The report authors contend that the survey findings suggest enterprises need a new approach to security.  With revenue, reputations and share price on the line, those who look to new approaches to security will not only protect the business, but have the competitive advantage.

The report suggests that application isolation puts the activities most often targeted by cybercriminals—downloading files, using applications, browsing the internet—into micro virtual machines. When these activities are initiated, the network is protected because malware is trapped inside the container.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...