security-business-image

Survey: 87% of Businesses Are Confident About Cybersecurity

Businesses Confident About Cybersecurity

In a year that has seen multiple massive data breaches and troubling cyberattacks, a new survey reveals 87 percent of businesses are “confident in their cybersecurity preparedness.” The survey, from SolarWinds MSP, included 400 businesses from the US and UK. Other findings in the survey:

  • 71 percent of businesses experienced a security breach “in the previous year
  • 31 percent suffered a DDoS attack or fraud, the same percentage of respondents experienced a “malicious insider attack,” and 28 percent were hit with ransomware
  • 61 percent count on growing cybersecurity budgets to improve security in the coming year

Let’s give these businesses the benefit of the doubt. The Equifax breach, for one, got a lot of press, the type of visibility that could make organizations—even the ones that haven’t been hacked—want to improve their cybersecurity game. If businesses are willing to spend more on cybersecurity measures, their confidence may be warranted.

What’s more, there are new tools they can use to increase security. Data recovery firm Kroll OnTrack reports that IBM Z, a data encryption system, can encrypt 13 GB of data per second per chip, with a total of 24 chips in the mainframe. Each day, IBM Z can run more than 12 billion encrypted transactions. This tool is primarily for enterprises that process financial transactions, which, if you think about it, includes quite a few organizations, given the volume of credit card payments people make each day, and the volume of e-commerce we’re seeing. Visanet alone handles 150 million transactions daily.

SImply put, the volume of data businesses need to protect is astronomical, and track records aren’t great. About 9 billion records have been compromised since 2013, and 96 percent of the data wasn’t encrypted. While the businesses in SolarWinds’ survey are confident, a report from Juniper Research estimates that data breaches will cost firms about $8 trillion by 2022.

There are a lot of security practices that are going to have to change. About 68 percent of organizations don’t do regular security audits, and less than half deployed new security technology after a breach. Companies storing their data in the cloud must have an incident response plan in place, because cloud providers are likely to get hacked. Yet, for 44 percent of organizations surveyed, response times to data breaches have increased since 2016.

Perhaps cybersecurity hubris is a result of businesses having confidence in the future of cloud security. After all, the top cloud providers—Amazon, Microsoft, and Google—have a lot at stake when it comes to making sure their clouds are secure, and these companies employ some of the best people in the business. Yet according to Earl Perkins, Gartner’s research vice president, “It’s possible cloud will fall victim to a tragedy of the commons wherein a shared cloud service becomes unstable and unsecure based on increased demands by companies.” Enterprises are generating so much data that public cloud solutions may not continue to be a viable solution for secure storage. Furthermore, security teams are facing a shortage in talent, meaning security solutions may not be able to evolve as fast as threats.

Businesses must inject confidence with a level of realism. They aren’t going to be able to deter all threats, but they can make sure the most important data are backed up in more than just two places. They can use increasing cybersecurity budgets for tools such as IBM’s new encryption mainframe and deception tools that lure hackers to fake networks, as well as virtual browsers that foil phishing scams. It’s good businesses are confident—they just have to back confidence up with proactivity.

By Daniel Matthews

Daniel Matthews

Daniel Matthews is a freelance writer from Boise, ID. Daniel received his Bachelor’s in English from Boise State University in 2006, and is currently working on a book about the 2008 financial crisis. Widely-published online, he specializes in research and analysis that sheds light on the intersection of tech, business, and current affairs. Daniel is an avid writer and technology enthusiast whose mission is to bring journalistic integrity and informed opinions to his audience in ways that make them think differently about the world. You can find him on Twitter and LinkedIn.

View Website

CONTRIBUTORS

Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...
Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in ...
The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
4 Open Source Business Intelligence Tools For Big Data Reporting

4 Open Source Business Intelligence Tools For Big Data Reporting

Open Source Business Intelligence Tools It’s impossible to take the right business decisions without having insightful information to back up ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...

NEWS

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...
Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...