According to the following multi-country survey, IT and cybersecurity professionals have uncovered numerous challenges in achieving better information and security management

Third, 41% of respondents cited primarily using dedicated asset management software for ISMS integration; 37% cited using special integration tools for this purpose. Some 10% had cited implementing the integration using their own scripts and APIs or transferring and synchronizing data manually. Also:

  • Compliance challenges for ensuring information security cited by respondents included:
    ⟩ increasing numbers of devices in the system, leading to scalability problems (33%)
    ⟩ the variety of devices and operating systems (33%)
    ⟩ the management of devices in mobile or hybrid working environments (32%)
    ⟩ limited IT staff or resources (39%)
  • 87% of respondents indicated their organizations are already using AI-enabled devices, linked to potential data security risks. This was countered by 46% of respondents in security primarily by training employees in the secure handling of data, or using secure servers for data processing to manage the risks and compliance with data protection regulations when using AI-enabled devices (43%). Some 40% cited implementing strict usage policies for this purpose, while 21% cited the use of mobile device management or unified endpoint management to disable or restrict AI capabilities.
  • Common staff queries to respondents included:
    ⟩ concerns about suspicious emails or possible phishing attempts
    ⟩ devices and their use and security
    ⟩ questions about the legitimacy of software or app downloads or updates
    ⟩ concerns about the security of personal devices used for work
  • In terms of device security, 26% of respondents received reports of lost or stolen devices with sensitive data “frequently” or “very frequently”. According to respondents, device loss one of the most high-risk or damaging issues for their organization: 37% indicated that lost or stolen devices with sensitive data had caused “extreme” or “significant” damage or risk to their organization in the past. Finally, vulnerabilities or corrupted files in company systems and devices (38%), as well as vulnerabilities, data breaches or misuse of AI tools or services (38) have also been cited by respondents to have caused “extreme” or “significant” damage or risk more often in the past than phishing emails (36%).