Survey: 87% of Businesses Are Confident About Cybersecurity

Security Business Image

Businesses Confident About Cybersecurity

In a year that has seen multiple massive data breaches and troubling cyberattacks, a new survey reveals 87 percent of businesses are “confident in their cybersecurity preparedness.” The survey, from SolarWinds MSP, included 400 businesses from the US and UK. Other findings in the survey:

  • 71 percent of businesses experienced a security breach “in the previous year
  • 31 percent suffered a DDoS attack or fraud, the same percentage of respondents experienced a “malicious insider attack,” and 28 percent were hit with ransomware
  • 61 percent count on growing cybersecurity budgets to improve security in the coming year

Let’s give these businesses the benefit of the doubt. The Equifax breach, for one, got a lot of press, the type of visibility that could make organizations—even the ones that haven’t been hacked—want to improve their cybersecurity game. If businesses are willing to spend more on cybersecurity measures, their confidence may be warranted.

What’s more, there are new tools they can use to increase security. Data recovery firm Kroll OnTrack reports that IBM Z, a data encryption system, can encrypt 13 GB of data per second per chip, with a total of 24 chips in the mainframe. Each day, IBM Z can run more than 12 billion encrypted transactions. This tool is primarily for enterprises that process financial transactions, which, if you think about it, includes quite a few organizations, given the volume of credit card payments people make each day, and the volume of e-commerce we’re seeing. Visanet alone handles 150 million transactions daily.

SImply put, the volume of data businesses need to protect is astronomical, and track records aren’t great. About 9 billion records have been compromised since 2013, and 96 percent of the data wasn’t encrypted. While the businesses in SolarWinds’ survey are confident, a report from Juniper Research estimates that data breaches will cost firms about $8 trillion by 2022.

There are a lot of security practices that are going to have to change. About 68 percent of organizations don’t do regular security audits, and less than half deployed new security technology after a breach. Companies storing their data in the cloud must have an incident response plan in place, because cloud providers are likely to get hacked. Yet, for 44 percent of organizations surveyed, response times to data breaches have increased since 2016.

Perhaps cybersecurity hubris is a result of businesses having confidence in the future of cloud security. After all, the top cloud providers—Amazon, Microsoft, and Google—have a lot at stake when it comes to making sure their clouds are secure, and these companies employ some of the best people in the business. Yet according to Earl Perkins, Gartner’s research vice president, “It’s possible cloud will fall victim to a tragedy of the commons wherein a shared cloud service becomes unstable and unsecure based on increased demands by companies.” Enterprises are generating so much data that public cloud solutions may not continue to be a viable solution for secure storage. Furthermore, security teams are facing a shortage in talent, meaning security solutions may not be able to evolve as fast as threats.

Businesses must inject confidence with a level of realism. They aren’t going to be able to deter all threats, but they can make sure the most important data are backed up in more than just two places. They can use increasing cybersecurity budgets for tools such as IBM’s new encryption mainframe and deception tools that lure hackers to fake networks, as well as virtual browsers that foil phishing scams. It’s good businesses are confident—they just have to back confidence up with proactivity.

By Daniel Matthews

Sebastian Grady

ERP Software License versus Cloud ERP SaaS Subscription ─ Pros and Cons 

Software License versus SaaS Subscription Your software is an asset. Software vendors such as Oracle and SAP are pressing customers to replace existing enterprise applications in order to move to the vendor’s new platform. Yet, ...
Mark Banfield

A Seamless Customer Experience Is Essential to Success in Today’s Digital Economy

Implement A Seamless Customer Experience The need for digital interaction has never seemed more critical than it does today. As the coronavirus continues to spread, citizens around the world are being asked to hunker down ...
Mark Rochester

Why Remote Migrations are Essential for Business Continuity

Remote Business Continuity We are approaching a banner year for the cloud. The COVID-19 pandemic has highlighted the importance of cloud technology to enable resilience and business continuity, and it will be a critical time ...
RPA-Data

How Digital Service Providers (DSPs) can Leverage RPA to Accelerate Data Migration by 2X

Accelerate Data Migration by 2X Ongoing trends in the Telco/DSP industry such as M&As, migration of the application to the cloud, and modernization of legacy applications have increased the frequency and scope of data migration ...
David Balaban

Ransomware – Cybercriminal Groups Know The Weak Points

Cybercriminal Groups Grow Data breaches and leaks represent a quickly growing security problem these days. When plenty of people work from home, the risk of data leaks is much higher. Cybercriminal groups know the weak ...
Kayla Matthews

New Security Regulation – Cybersecurity Maturity Model Certification (CMMC)

Cybersecurity Maturity Model Certification Changes are on the horizon for the Department of Defense (DoD) and its contractors. Late last year, the DoD announced the Cybersecurity Maturity Model Certification (CMMC), which officially released in January. The ...