IT Audit Survey Exposes Weak Risk Assessment

Lack of training, too little use of outside auditors are two faults noted in Protiviti benchmarking survey.
  • Roy Harris (Unknown Publication)
  • — 06 October, 2011 10:09

Even in the face of costly and embarrassing corporate security breaches, one in four companies fails to conduct any IT risk assessment. And 42% say there are areas of their information technology audit plans that cannot be addressed because of a lack of resources and expertise.

These are two of the findings of Protiviti's 2011 IT Audit Benchmarking Survey, for which nearly 500 professionals -- including chief audit executives, audit directors and IT audit directors and managers -- were asked to analyze underlying audit trends, and perhaps to identify enforcement gaps in Corporate America. The survey was taken both online and in electronic form, and gave respondents 35 questions in four categories: IT audit in relation to the internal audit department; IT risk assessment; audit plan; and skills and capabilities.

"There are simply too many risks associated with the pervasive use of technology ‑including social media and mobile devices ‑and not enough focus on identifying and managing those risks," Bob Hirth, Protiviti executive vice president and leader of the firm's global internal audit and financial controls practice, said. "Businesses have to get serious about addressing IT risks or they will fall victim to their own vulnerabilities."

To illustrate how smaller companies tend to do much less audit work than larger ones, the survey registered 43% of companies smaller than $100 million in annual revenue saying that they had no IT audit function at all. Among companies with revenue between $100 million and $1 billion, 82% lacked "a designated IT audit director or someone in an equivalent position," Protiviti's account of the survey said.

As for the use of outside auditors to help with IT audits, only 13% of companies with $100 million to $1 billion in revenue used outside auditors to help with IT audits, and among the smaller-than-$100 million group, only 17% used outside auditors. According to Protiviti, higher percentages in both areas were expected, because companies with less than $1 billion sales have no full-time IT audit resources in place.

  • Nearly 70% of North American companies have not completed evaluations and assessments of their IT governance process, as described in the Institute of Internal Auditors Standard 2110.A2. And 36% said they didn't intend to.
  • In 29% of North American companies, "line of business executives" such as chief information officers ‑have little to no involvement with the IT risk assessment process, according to the survey.
  • Most companies with more than $1 billion in annual revenue offer IT audit staffers at least 40 hours a year of training. But 32% of companies between $100 million and $1 billion, and 20% of companies between $100 million and $1 billion, provide no IT skills training.

"If an organization or internal audit function is not thinking about IT governance, IT risks and specifically IT risk assessment, it should be," David Brand, a Protiviti managing director and the firm's national IT audit leader, said in a press release describing the survey results. "The increased use of and demand for technology and data compel companies to review how these technologies are being leveraged and the risks they are creating."

Tags: auditing, Business Management, Protiviti

Comments

Post new comment

The content of this field is kept private and will not be shown publicly.
Users posting comments agree to the CSO comments policy.
Login or register to link comments to your user profile, or you may also post a comment without being logged in.
CSO Corporate Partners
  • FirEye
  • Clear Swift
  • Trend Micro
  • Sophos
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Risk Management Solutions

Protect resources and ensure security compliance through incident detection, response, and remediation.

Security Awareness Tip
Clearswift tips: Guidelines for introducing and policing an effective IT Policy

1. Make it clear that the policy is not about playing ‘Big Brother’ but to ensure the security of employees, company information and data and to safeguard the company’s reputation.
2. Invest time to get buy-in from managers and their teams.
3. Convey the message of flexibility – with regard to social media, it is not about blocking staff usage but working in everyone’s interests to ensure that threats are contained.
4. Introduce a regular company-wide training programme that everyone attends at regular intervals throughout the year, not merely as part of an induction programme.
5. Within the training programme make sure that there are specific examples to demonstrate each rule or regulation, and that there is a clear explanation of the dangers of casual or careless talk on social networking sites. Again use examples, employees need to understand the consequences of raising a throwaway comment that has negative connotations for the business, as much as they need to be aware of dangers of making a more direct but ill-considered attack on a competitor, regulator or even a fellow colleague. They need to be clearly advised on any impact on the company and/or legal action or inquires that may be raised as a result.
6. Alert employees to any changes in policy through regular clear communication.
7. Reinforce the operational policy guidelines regularly, cover everything from blogging to Facebook, LinkedIn and Twitter.
8. Ensure that the rules are fair and that they apply throughout the business.
9. Enforce the rules – if there is a deliberate or malicious contravening, disciplinary action needs to be taken. A policy isn’t worth having if it is seen to be lax and unenforced.
10. Review the policy regularly to ensure you keep up to date with new systems and technology.

Phil Vasic is Regional Director, APAC, at Clearswift, the software security company www.clearswift.com
Security ABC Guides

7 Ways to Protect Your Business Printers

Can a hacker burn down your business by remotely setting one of your printers on fire? Researchers at Columbia University have recently proposed such a scenario, although HP quickly denied that it's possible. However, even if your printers can't be used as remote firestarters, there are many risks involved in networking a printer.