Computer Economics has released its major annual study on 34 IT management best practices, and one important category–IT security and risk management–is showing mixed results. Adoption of one vital IT security best practice is down, while others are up or flat.
The bad news is that IT security policies appear to be going in the wrong direction. Figure 3 from our full study, IT Management Best Practices 2019-2020, shows that IT security policies are a mature practice, with 54% saying their security policies are formal and consistent. The fact that most organizations have IT security policies is expected, since such policies are often mandated by corporate standards or industry regulations. But it is disappointing that only 54% of them establish them formally and consistently. What is more disappointing is that the percentage is down from 57% last year. This is surely one reason that we continue to see devastating, high-profile security breaches every year.

Security incident management, at 51%, is third on this most mature list, but at least it is moving in the right direction. It was at 48% maturity last year. Security incident management is a process to record, track, and resolve security incidents. When a security incident takes place, an organization will have a response team in place and clearly defined procedures for managing the incident. But again, only about half of IT organizations formally and consistently respond to and manage security incidents.
Penetration testing, at 44%, is new to our survey. Not seen on this figure is IT security compliance audits, which is unchanged from last year at 42%. Both of those bear watching in the coming years, as they are important disciplines.
“Because so many security practices are in the top five, on the surface it appears companies are emphasizing security,” said Tom Dunlap, director of research for Computer Economics, an Irvine, Calif.-based research firm. “Unfortunately, it isn’t really true. Security practices that aren’t adopted formally and consistently leave major security risks. Security practices are most definitely not optional.”
Some of 34 best practices are well-established disciplines and are widely accepted. Others are gaining traction among leading-edge organizations. Still other practices are being widely promoted by tools vendors and consultants but are only rarely adopted, and it remains uncertain whether they will endure. Our goal in this study is to provide IT executives with real-world data on how widely each practice is implemented, a basis for comparing their organizations with their peers, and a means of identifying emerging best practices.
This study is now in its 15th year. Each year, we ask IT organizations in our annual survey to what extent they have adopted a selected list of IT management best practices. Survey participants have five response choices:
The best practices in the study are as follows:
The full study is designed to increase the awareness of IT leaders concerning what are the best practices in IT management, provide benchmarks against which an IT organization can compare its own adoption and practice level, and justify investments to improve an organization’s IT management practices.
This Research Byte is a brief overview of our report on this subject, IT Management Best Practices 2019-2020. The full report is available at no charge for Computer Economics clients, or it may be purchased by non-clients directly from our website (click for pricing).
Avasant’s research and other publications are based on information from the best available sources and Avasant’s independent assessment and analysis at the time of publication. Avasant takes no responsibility and assumes no liability for any error/omission or the accuracy of information contained in its research publications. Avasant does not endorse any provider, product or service described in its RadarView™ publications or any other research publications that it makes available to its users, and does not advise users to select only those providers recognized in these publications. Avasant disclaims all warranties, expressed or implied, including any warranties of merchantability or fitness for a particular purpose. None of the graphics, descriptions, research, excerpts, samples or any other content provided in the report(s) or any of its research publications may be reprinted, reproduced, redistributed or used for any external commercial purpose without prior permission from Avasant, LLC. All rights are reserved by Avasant, LLC.
Login to get free content each month and build your personal library at Avasant.com