SHARE
Facebook X Pinterest WhatsApp

The Evolving State of Cyber-Threats

Apr 28, 2015

The Evolving State of Cyber-Threats

Under PressureUnder Pressure

50% of respondents said that preventing cyber-attacks is the most important or a top three IT issue for their organization.

Damage ControlDamage Control

76% of respondents reported that their organization has experienced a damaging breach over the past year.

Money MattersMoney Matters

44% increased the portion of their IT budget allocated to security. Among large enterprises, the figure rises to 54%.

The Biggest ProblemsThe Biggest Problems

Respondents said that the top problems were: corruption of servers (26%), prolonged e-mail system failure (18%), revenue loss (18%), loss of employee information (14%) and other (24%).

No Clear Strategy?No Clear Strategy?

Only 29% of the respondents said that they have established best practices to try to get the problem under control.

No WorriesNo Worries

Overall, 20% of companies said that cyber-attacks are not a major issue. Among small firms, the figure rises to 27% but among large enterprise it drops to 8%.

New RisksNew Risks

New and different technologies are shifting the risks. 71% of respondents at large firms cited concerns over cloud vulnerabilities, and 59% rated BYOD as a major risk.

Eye on InsidersEye on Insiders

64% of respondents at large companies said that they are concerned about IT insiders causing incidents. Among mid-size and small firms, the respective figures are 62% and 46%.

Passwords Are a ProblemPasswords Are a Problem

83% of respondents at large firms indicated that password compromise is a problem. At mid-size and small firms the figures were 83% and 76%.

Dodging DDoSDodging DDoS

71% of large enterprises rated DDoS as a major concern. However, among mid-size and small companies the figure drops to 49% and 50%.

Mixing SolutionsMixing Solutions

95% of the survey respondents said that they are involved in purchasing six or more security products in order to aggregate and assimilate the necessary information about attacks.

Staying InformedStaying Informed

75% of the survey respondents said that key information sources are their peers and technology content Websites. About 60 percent said they look to analysts.

Final ThoughtsFinal Thoughts

Changes in the way cyber-attacks are carried out are changing the way business and IT leaders deal with security. While traditional IT vendors remain important, infrastructure providers also play a role in security efforts.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.