SHARE
Facebook X Pinterest WhatsApp

Companies Are Ill-Prepared for Cyber-Attacks

Jan 31, 2017

Companies Are Ill-Prepared for Cyber-Attacks

Companies Are Ill-Prepared for Cyber-AttacksCompanies Are Ill-Prepared for Cyber-Attacks

Most organizations are not prepared to deal with cyber-attacks and insider sabotage, and some are concerned about security when migrating to the cloud.

Top Cyber-ThreatsTop Cyber-Threats

Outsider attack: 43%,
Data vulnerability: 38%,
Insider sabotage: 35%,
User errors: 35%,
Phishing: 35%

Security Concerns About the CloudSecurity Concerns About the Cloud

Security of data in transit: 66%,
Security of data at rest: 60%,
Security of backups and snapshots: 54%,
Increased attack surface: 53%

Secondary Cloud Security IssuesSecondary Cloud Security Issues

Lack of visibility: 51%,
Lack of policies: 41%,
Access from unauthorized devices: 34%

Job ConcernsJob Concerns

66% of the IT decision-makers surveyed worry that they will lose their jobs because of security issues.

Concerns About Monitoring the CloudConcerns About Monitoring the Cloud

47% of IT professionals are unable to monitor workloads across clouds. 44% agree, or strongly agree, that there is insufficient network control and monitoring in the cloud.

Managing Security of Hybrid CloudsManaging Security of Hybrid Clouds

Seven out of 10 IT decision-makers said they are concerned, or completely concerned, about managing the security of hybrid infrastructures.

Worry About Financial CompensationWorry About Financial Compensation

73% of respondents worry about the financial compensation their company might have to pay as a result of a security breach.

New Technologies Can HelpNew Technologies Can Help

Because the cloud and hybrid infrastructure adoption pose unknown security challenges, CIOs must prevent zero-day exploits, advanced persistent threats (APTs), and other cyber-crimes by adopting breakthrough technologies.

Analyze Your DataAnalyze Your Data

When opting for a hybrid cloud solution, perform an analysis of the type of data your organization handles and evaluate it based on its sensitivity.

What to Keep In-HouseWhat to Keep In-House

Store critical, personal and private data related to intellectual property in-house, and only give access to authorized personnel.

Use Many Authentication MechanismsUse Many Authentication Mechanisms

All types of data access should be done via multiple authentication mechanisms. These should involve more than just user names and passwords. Two-factor or biometric data can offer additional safeguards.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.