
A growing solicitude; Cause and Effects in relation to Pakistan
The 21st century has witnessed mushroom growth in telecommunications, computing power and data processing technologies. Nowadays, electronic data processing is within reach of every individual, due to compact, powerful and cheap computing devices. Modern communication technologies like internet not only enable these devices to become globally connected with each other but also share their processed data and information in a very convenient manner. However this convenient and simple access to information has given birth to some vulnerability, one of them is the risk of theft and misuse of the valuable information.

In year 2010, the global internet users have been increased to 1.97 billion generating astounding traffic of 294 billion emails per day, so far around 262 billion emails are found to be spam emails which are 89.1{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of the global email traffic. Similarly 662 data breaches have been recorded by identity theft resource centre, in which 51{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} breaches are related to the exposure



The outrageous facts of flaws in information security have compelled many countries to initiate drastic improvement in this sector. Several countries have started to boost up their funding in information security sector. In 2010 US alone has increased its cyber security budget from $6.8 Billion to $7.5 Billion, in which it has

Nevertheless so far in Pakistan, the sector of information security has been left unattended. Numerous public & private sector organizations are facing losses due to information security threats. Therefore in order to project the current situation of information security within Pakistan, a survey has been conducted to analyze the global and local opinions regarding prominent factors like challenges for Information security, top IT risks, investment in Information security and countermeasures for Sensitive data leakages and IT threats.
1. Challenges for effective delivery of Information Security Initiatives
According to global prospective, 64{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of survey participants have indicated that security awareness of the employees is quite a big challenge. Many organizations have serious concerns over un-intentional security breaches made by the employees, most of them believe that employees don’t have sufficient knowledge about security threats associated with advance devices like smart phones, handheld computers etc, therefore the solution is to provide proper IT security awareness trainings, but due to global economic recession, financially managing these trainings have became quite challenging task. Furthermore the said recession has also lowered down the availability of resources and funds causing a challenging situation as indicated by most of participants.

So far in Pakistan, the bad economic condition of the country has caused quite difficult situation for financing information security initiatives, 81{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of survey participants have indicated that adequate budget is one of the major challenge towards the delivery of information security initiatives. Furthermore around 72{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of participants have highlighted that Business uncertainty is also significant challenge because day by day degrading security and economic conditions of the country have produced chaos situation for many businesses and most of them have ceased their further investments as indicated above. It also be noted the around 71{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of survey participants have pointed out that regulatory change is also quite challenging. In Pakistan, the upper management of many organizations especially public sector organizations are not fairly aware about information security threats due to lack of vision and technological knowledge, therefore most of the time they show resistance in regulatory changes.

It has also been observed that the dreadful monetary condition has caused reduction of remuneration packages for several IT Security professionals, thus diminishing their motivations towards working in the country and has compelled them to go abroad for better pay packages. Therefore the availability of skilled resources has also become a noteworthy challenge towards the effective delivery of said initiative as identified by 70{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of participants.
2. Top IT risks for Organizations
It has been found that numerous organizations have made their systems automated and all of these systems are powered by critical IT infrastructure from the backend. These infrastructures are on the hit list of cyber criminals who paralyze them through their attacks, resulting in non-availability of IT resources for some valuable time. When the global survey participants have been asked to identify their top five areas of IT risks for their organization, most of them have indicated that the continuous availability of critical IT resources is one of the top most IT risks for their organization.
It has been also observed that the usage of mobile computing for business purposes have also increased, the serious risk associated with mobile devices is the risk of losing data (Sensitive information) through them due to theft or working in unsecure environment. Around 64{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of survey participant have identified data as one of the top five IT risks in 2010. Similarly vulnerabilities in applications and databases also possess high security concerns, around 55{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of survey participants have also quoted it as one of top five IT risks.

Similar to the global participants, around 86{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of local survey participants have also placed continuous availability of critical IT resources as the second most prominent IT risk.

3. Investment in Information Security
In order to further enhance any sector, investment plays a vital role in its transformation. Therefore to know the organization’s plans for further investment in information security sector, a query regarding the said subject have been disseminated within the global survey participants. Survey results exhibit that despite of tight economic situation many organizations have planed to spend more money over the next year. Majority of organizations have analyzed the security issues associated with mobile computing, most of them have shown their serious concerns over the leakage of information through these devices. Therefore the top priority of most of the organizations is prevention of data leakages especially from mobile devices which can be judged by the survey results as 50{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of survey participants have planned to spend more


4. Countermeasures for increasing IT Security Risk
Observing the efforts taken by the organizations to address the potential new risks, it has been found that 39{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of global survey participants are making policy adjustments, 38{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} are increasing their security awareness activities, 29{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} are implementing encryption techniques and 28{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} are implementing stronger identity and access management controls. Survey results show that many respondents are keen to make and modify information security policies, in order to manage new technologies and information flow especially from mobile devices. Furthermore most of them have also focused on increasing security awareness trainings in order to educate employees about the usage and associated security risks regarding new emerging technologies and devices.


5. Controlling leakage of Sensitive Information
It has been observed that data leakage often caused due to careless attitude of employees who are unaware that their actions might cause leakage of sensitive information. A large portion of this issue is usually associated to absence of specific policy or inadequate awareness of policies. To address this issue, majority of organizations have developed specific policy for handling sensitive information as indicated by 73{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of global survey participants. Moreover around 65{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of respondents implemented additional security mechanism for protecting information in order to further enhance their existing countermeasures against the data leakage.

Likewise the global surveys, around 75{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of local survey participants have defined a specific policy for controlling the leakage of sensitive information. It has also been observed that the new generation employees are excessively utilizing the instant messaging and social networking services in their daily routine. Several organizations are experiencing difficulties in securing the flow of information through these services due to lack of awareness of employees and high cost of security software, therefore in order to control the leakage of information through the said services, numerous organizations have prohibited the use of instant messaging and social networking at their premises as indicated by 65{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} of survey participants.

Key Findings
Comparative analysis of both global and local surveys depicts quite different picture. At few places the interests of both the global and local community are found to be similar but at several places there are contradictions.
In 2010, majority of global community considered the IT security awareness of employees and increase work force mobility as most significant challenges towards effect delivery of IT security initiative, whereas the local community has highlighted the un-availability of funds, skilled resources and effective regulatory changes are challenging obstacles towards the delivery of said initiative. Furthermore global participants have declared continuous availability of IT resources and sensitive data are prominent areas prone to IT risks whereas local participants have shown their concern over availability of proper legal & regulatory support, physical environment and applications & databases as top IT risks.
It was also noted that despite of unstable global economic situation, several global organizations have proposed to increase their funding for dealing with information security threats, but irrespective to global attitude, most of the local organizations have planned to stay constant regarding their expenditure towards information security.
Moreover during the last year, numerous global participants have been engaged in making adjustment in IT security policies, boosting up the awareness campaigns of employees and spending on advance encryption techniques for constructing stronger defense against IT risks, whereas in Pakistan, majority of local organizations were busy in implementing strong identity and access management system, enhancing their IT security audit capability and likewise the global community spending on advance encryption techniques in order to diminish the increased IT risks.
It was also noted that many global organizations have defined specialized policy and enhanced their security systems for controlling the leakage of sensitive information. Furthermore they have also utilized internal auditing mechanism for checking and ensuring their control system against said threat. Likewise in Pakistan, majority of local businesses have made the policy for controlling the exposure of sensitive information, but on other hand unlike the global trend, they have focused on restricting the access to email, chat and social networking services and also on implementing content monitoring and filtering systems to address the issue of leakage of sensitive data.
Conclusion
It has been observed that the IT security threats are exponentially increasing year by year. During 2010, around 50{e1f18614b95d3cd6e4b3128e1cd15d99b042a60a5a19c19b7a8e07e7495efa10} more information security incidents have been reported as compared to 2009. Therefore the global community has been very keen to address this issue and taking stronger steps for safeguarding the precious information and diminishing the increased IT security threats.
As far as Pakistan is concerned the scenario is quite different. Several organizations have ceased further investment in information security which undisputedly is imperative in its very nature. Furthermore the general masses are less convergent to IT security risks especially associated to mobile devices, social networking services and information handling; resulting in data breaches and loss of data. Moreover due to fair resistance in regulatory modification and absence of proper legal and regulatory support for dealing with information security threats, many IT security professionals are facing problems in legally handling the IT security incidents and managing strong defense against said incidents.
Therefore in order to make things better, local organizations should increase their investments in information security sector. They must begin conducting IT security awareness campaigns and seminars for employees especially addressing security threats associated to mobile computing and social networking. Furthermore they have to turn their focus towards establishing a clear “Information Security Policy” and adopt it as a strategy to mitigate risk. Moreover they should start adopting internationally recognized standards and frameworks for information security in order make their countermeasures up to the mark.