70% of IT workers skip key security steps due to work pressures

A young professional showing signs of stress at work
(Image credit: Shutterstock)

Security and development teams are groaning under the strain of securing organizations, according to a report released this week.

The report, released by web application security tools company Invicti Security, found 78% of respondents reported increased stress levels over the last year. One in five DevOps and security professionals have considered quitting their jobs due to these pressures.

The report blames the problem on a backlog of security tasks, caused in part by a cyber security skills shortage. It says that the average IT team member would need a two-week break from their regular work just to catch up with what it calls 'security debt'.

The report, which surveyed 600 executives and hands-on practitioners across security, development and DevOps roles, found that the heavy workload had an effect on the security process. 70% of respondents frequently or always skipped security steps when delivering projects, it said.

A lack of security in the software development lifecycle isn't helping. Almost half of all developers said that application security testing is completely separate from development, with only one in five reporting that they have fully integrated it into the development process. The result is less secure software, with one in three security issues making it through the development and testing stage to production.

A lack of focus on post-deployment application scanning exacerbates the problem, as professionals fail to allocate enough resources to it, the report said. Only seven in ten of those that fully adopted security in the software development phase regularly scanned more than three quarters of their applications for vulnerabilities and then remediate them.


The truth about cyber security training

Stop ticking boxes. Start delivering real change.


Security professionals want more automation to help lighten the load. One in six of them said that their companies do not have enough automation in place to test and remediate security issues.

That's due in part to a lack of trust in the tools. Only half of the respondents were confident enough in the accuracy of their vulnerability scanning software, prompting almost four in five to manually verify results. Each verification takes around an hour.

Invicti recommends better training for developers and security teams, paying more attention to post-deployment vulnerability scanning, and automating manual tasks where possible. Machine learning is also making tools more aware of vulnerability context, it concluded.

Danny Bradbury

Danny Bradbury has been a print journalist specialising in technology since 1989 and a freelance writer since 1994. He has written for national publications on both sides of the Atlantic and has won awards for his investigative cybersecurity journalism work and his arts and culture writing. 

Danny writes about many different technology issues for audiences ranging from consumers through to software developers and CIOs. He also ghostwrites articles for many C-suite business executives in the technology sector and has worked as a presenter for multiple webinars and podcasts.