1 Introduction

The World Wide Web, mobile computing, and Cloud Computing have changed the world, providing a wide range of information, anytime and anywhere [1]. However, the developments of such technologies also allows new techniques for abusers to misuse or destroy information [2]. These “cyber vandals” can illegally access or destroy online information using techniques such as malware programs (e.g. viruses, Trojans and worms), hacking or denial of service (DoS) attacks [3].

To overcome these threats, it is essential for both information providers and information users to have good information security practices, which can be defined as ensuring the availability, integrity and confidentiality of information [46]. However, before Information Security practices become routine, there must be an appropriate level of Information Security Awareness (ISA), which refers to a state in which information users are aware of the information risks and understand the power of both physical and non-physical information security [7, 8]. ISA has become one of the strongest lines of defense against ongoing information threats; it has been demonstrated that a high-level of ISA can reduce information risks and increase the efficiency of information security performance [7].

Although this is generally well-understood, some countries, particularly those which are highly-censored, such as Saudi Arabia, does not appear to have understood either the devastating risks of information security (InfoSec) threats or the importance of ISA. Indeed, Saudi Arabia has among the highest levels of information security risk [9]. This paper aims to understand the relationship between these high risk levels and InfoSec, specifically in the context of Saudi Arabia.

2 Methodology

While our understanding of InfoSec in Saudi Arabia is poor, the concept of InfoSec is well-defined in the literature and several excellent survey instruments exist for assessing InfoSec. Moreover, this study seeks to gather data from as large a sample of the Saudi Arabian organizations as possible, so a survey is an ideal data gathering technique [10, 11]. An online survey is particularly effective over long distances and is well-suited to Saudi culture because women in Saudi Arabia cannot speak to men who are not relatives. Consequently, an online survey can gather a large sample from organizations of both men and women in a short time without any ethical problems.

The survey questions were selected from instruments developed by the Cyber Security Organization in Malaysia the Excellence of Information Assurance Centre and Alelm organization in Saudi Arabia. All of the survey questions from either survey were included unless they would have been inappropriate for the Saudi culture.

The questions in this research were semi-closed ended question that combine the advantages of closed-ended questions and open-ended questions. The survey was translated into the Arabic language because the participants are all from Saudi Arabia. The initial survey was subjected to pilot testing by Saudis who were fluent English speakers to ensure both the validity of the questions and the accuracy of their translation into Arabic. Pilot test participants strongly recommended making all questions optional as they believed that many Saudis would simply stop answering the questions if they encountered a compulsory question that they did not want to answer. The survey questions were then uploaded to Survey Monkey with all questions being optional.

To ensure the high response rate, the researcher distributed an online link to the survey using popular Saudi organizations educational and business websites and IT departments staff emails. This worked well, resulting in 124 responses.

3 Results

Although there were 124 organizational participants from Saudi Arabia in this study, responses in this paper focuses on InfoSec practices in organizations.

This section discusses information assurance tools and measures in the organizations including in two-factor authentications, password practices, firewall system, anti-viruses software and Information security training for employees.

As depicted in Table 1, 82 of the 124 organizations have not implemented two-factor authentication such as smart cards, biometric or one time passwords, whereas the remaining one-third already implements two-factor authentication. Pairing of two basic authentication approaches is very well established among many organizations. However, cautioned that “although use of two-factor authentication increases the overall security by additional layer of complexity, it is important to realize that these systems are not infallible” [12].

Table 1. Implementation of two-factor authentication in organizations

Data from Table 2 revealed that 31.5 % of the organizations have poor security measures with respect to password setting on the assessment of their respondent-representatives to the present study. Meanwhile, slightly over one-fifth of the organizations have very poor procedures in setting passwords. Only 8.1 % of the organizations have very good password measures, whereas 16.9 % have good password setting security processes. On the other hand, 17.7 % chose to stay neutral regarding the issue and 4 % of the respondents reported that password setting is not practiced in their organizations. It may be observed from the framing of the item that it was the practice, not the policy, which was being evaluated. As posited in [13], “password mechanisms and their users form a socio-technical system, whose effectiveness relies strongly on users’ willingness to make the extra effort that security conscious behavior requires”.

Table 2. Passwords practices in organizations

Table 3 revealed that most of the respondents 29.8 % stood on neutral ground with respect to the firewall systems installed in their organizations. About 33.1 % of the organizations reported that their firewall systems are good or very good, whereas 34.7 % of the organizations have poor or very poor firewall systems. Three (2.4 %) organizations do not have security firewall systems. Firewalls are one of the most crucial elements in InfoSec. The secret to the success of firewalls is the formulation and implementation of filtering rules which protect the system from unauthorized access [14].

Table 3. Firewall system in organizations

Table 4 revealed that 43.5 % of the anti-virus software used by the organizations have good or very good performance ratings. Meanwhile 34.7 % of the organizations adopted a neutral stance regarding the anti-virus software issue. On the other hand, 19.4 % of the organizations indicated poor or very poor ratings for their anti-virus software. Anti-virus software is a crucial element of InfoSec because it serves as a solid line of defense capable of detecting and removing viruses before it causes significant harm to the system and the data stored in it [15].

Table 4. The strength of anti-virus software in organizations

Table 5 indicated that majority of organizations (70.2 %) have not offered special InfoSec training to employees. On the other hand, 29.8 % reported offering special InfoSec training. Adequate InfoSec training for all employees is required as per InfoSec standards. Common training areas include information security awareness, asset classification and control, responding to security-related events, web access and messaging, user access control and responsibilities, legal compliance, as well as business continuity awareness and procedures [16].

Table 5. InfoSec training offered to employees in organizations

4 Conclusions and Future Research

This paper has suggested that the level of attacks may be due to a lack of Information Security (InfoSec) practices among the Saudi organizations. A survey of 124 organizations in Saudi Arabia has indicated that InfoSec practices are in fact very low and that a number of information security risks may be related to Saudi awareness or culture.

The paper has indicated that a problem exists within the IT practices of many Saudi organizations. The next phase of this research will provide appropriate solutions for the existed weaknesses and recommendation to increase the InfoSec awareness and practices in organizations in Saudi Arabia. This study will proposed the InfoSec Cultural Adaptation Process model (InfoSec CAP) as a process to inform a culturally appropriate response to this challenge.