Why IT Pros Are in Denial of Security Threats

Why IT Pros Are in Denial of Security Threats

Why IT Pros Are in Denial of Security ThreatsWhy IT Pros Are in Denial of Security Threats

IT security pros don’t regard themselves as potential targets of cyber-attacks, possibly accounting for a lack of cyber-preparedness.

Cyber-Attacks of Most ConcernCyber-Attacks of Most Concern

Asked what type of cyber-attack causes the greatest concern, 67% of respondents named advanced persistent threats, 57% named zero-day attacks and 37% pointed to login attacks.

Threat Detection Technologies One Year OutThreat Detection Technologies One Year Out

43% of respondents say that 12 months from now their technology use would not change and 6% said it would decrease.

Consequences of Poor Threat IntelligenceConsequences of Poor Threat Intelligence

60% of respondents said that during the last two years, poor threat intelligence prevented them from stopping at least five security breaches.

Adoption of Machine-Generated IntelligenceAdoption of Machine-Generated Intelligence

65% of respondents believe machine-generated intelligence is essential to a strong cyber-defense because current threat intelligence is inaccurate or incomplete.

Use of Security AnalyticsUse of Security Analytics

Only 36% of respondents say their IT security team uses security analytics. Of these respondents, 64% believe security analytics is essential (19%) or very important (45%).

Security Alert PrioritiesSecurity Alert Priorities

64% of respondents would like alert severity assigned by device. 34% say their companies use this approach.

Time for Detected Anomaly AlertTime for Detected Anomaly Alert

34% of respondents say it takes hours to receive intelligence that security analytics has detected an anomaly. 11% say it takes minutes and 6% say it takes seconds.

Integration of Intelligence Reports With Other ToolsIntegration of Intelligence Reports With Other Tools

The most desirable features of machine-generated intelligence solutions are clear, concise and unambiguous intelligence reports and integration with security information and event management (SIEM) save file and other network monitoring tools.

Top Reasons for Investing in Machine-Generated SolutionsTop Reasons for Investing in Machine-Generated Solutions

The top four reasons for buying machine generated tools are: To speed up detection of anomalies: 65%. To speed up intelligence generation: 55%. Accuracy of intelligence: 50%. Reduce severity of attacks: 49%

Most Likely Criterion for Machine-Generated IntelligenceMost Likely Criterion for Machine-Generated Intelligence

Companies are most likely to measure the increased ability of machine-generated intelligence to respond quickly to a cyber-attack and prevent loss of confidential information.

CIO Insight Staff
CIO Insight Staff
CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need network monitoring technology and solutions to maintain regulatory compliance for their teams and organizations.

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends, and analysis.

Latest Articles