A large proportion of the UK public is worried that government spending cuts will have a negative effect on data...
security, a survey has revealed.
Details of government cuts are to be revealed by Chancellor of the Exchequer George Osborne when he unveils the 2011 Budget at 12.30 today.
Nearly half of the respondents to the YouGov survey said they are concerned about the safety of their personal and financial information, while 35% are worried about security around sensitive government information.
Only 47% of 2,000 respondentssaid they are very or fairly confident that central government organisations are able to keep people's data safe, and just 36% expressed confidence in local councils.
However, budget cuts need not necessarily have a negative effect on public sector data security, says Andy Philpott, regional vice-president, UK and Ireland, for security firm Websense, which commissioned the survey.
"With more government organisations starting to share services such as their IT, this is a great opportunity for them to invest in an integrated security solution that not only reduces costs, but also increases their data security," he says.
An example of this, says Philpott, would be the adoption of an integrated hybrid approach that embraces both the cloud and on-premise security that can save companies as much as 40%.
Data security is unlikely to feature highly in the 2011 budget, says Peter Sommer, visiting professor at the London School of Economics.
"We know there is £650m of real new money for cyber. I don't expect any further increase," he says. Sommer, who works closely with government in the area of cyber security, says his expectations are based on a general observation on the state of the country's finances and the extent of cuts elsewhere rather than any specific inside information.
He also expressed doubts that the 2011 budget will include any mechanisms for encouraging or rewarding better security because these are typically "fraught with practical difficulties".
For more on the 2011 Budget, click here .
Download security guides by the Jericho Forum from Computer Weekly (requires registration ) >>
- Jericho Forum - the vision
- The 11 security commandments
- How to manage data privacy
- How to manage device lifecycles
- How to manage the enterprise lifecycle
- How to tackle encapsulation and encryption
- How to tackle Enterprise Information Protection & Control
- How to tackle IT audit and compliance
- How to tackle internet filtering and reporting
- How to tackle identity management and federated identity
- How to tackle risk lifecycle management
- How to tackle information access policy management
- How to tackle information classification
- How to tackle information lifecycle management
- How to tackle trust and co-operation
- How to tackle trust management
- How to tackle trust management and business impact levels
- How to tackle trust management and control stratification
- How to tackle trust management: Impact sensitivity categorisation
- How to tackle secure protocols for wireless networks
- How to tackle secure protocols and mobile management
- How to establish end-point security
- How to select cloud formations for secure business collaboration
- How to make the business case for de-perimeterisation
- How to approach architecture for de-perimeterisation
- How to tackle collaboration oriented architectures (framework paper)
- How to use Collaboration Oriented Architectures
- Network sharing - is it time to rethink the structure of the mobile industry?
- How to create inherently secure communications