Confidence in Effective Cyber-Protection Wanes

Confidence in Effective Cyber-Protection Wanes

Confidence in Effective Cyber-Protection WanesConfidence in Effective Cyber-Protection Wanes

By Karen A. Frenkel

Low Confidence in Deployed Security TechnologiesLow Confidence in Deployed Security Technologies

27% of surveyed IT decision-makers said they are “confident” that technologies they have implemented will work against cyber-threats. 58% report being “somewhat confident” and are seeking alternatives.

Security Technologies in UseSecurity Technologies in Use

Respondents are using the following cyber-protection technologies: Traditional firewall: 86%, Anti-virus software: 71%, IDS/IPS technologies: 59%, Log management: 58%, SIEM: 44%

Cyber-Insurance Is Not PopularCyber-Insurance Is Not Popular

Despite concerns about cyber-vulnerability, only 21% of respondents said they have cyber-insurance.

Lack of PreparednessLack of Preparedness

Just 15% of respondents said their employees are “well-prepared” to spot the signs of an attack and react accordingly. 28% said they are well-prepared for a breach.

IT Infrastructure Is VulnerableIT Infrastructure Is Vulnerable

72% of respondents said their IT infrastructure is “not well protected” and is vulnerable to advanced persistent threats.

Rethinking InfrastructureRethinking Infrastructure

52% of respondents said rethinking their infrastructure to keep pace with advanced persistent threats is a priority.

Brand Reputation Is at RiskBrand Reputation Is at Risk

68% of respondents said their reputation is more at stake than their financials due to vulnerability to cyber-attacks. 19% said they could withstand a small financial hit while 13% said a cyber-attack would devastate them financially.

Top Security ConcernsTop Security Concerns

Areas of greatest concern are: Network perimeter: 23%, Endpoints: 21%, Web applications: 14%

Prioritized Security InitiativesPrioritized Security Initiatives

Respondents ranked security initiatives, in terms of priority, as follows: 1: Network monitoring, 2: Antivirus software, 3: Data encryption, 4: IT security professional, 5: Cyber-insurance policy, 6: Provider of managed services

CIO Insight Staff
CIO Insight Staff
CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need network monitoring technology and solutions to maintain regulatory compliance for their teams and organizations.

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends, and analysis.

Latest Articles