88% Feel Vulnerable To Data Threats

Organisations are increasingly aware of the threat posed by data breaches, according to Thales’ 2017 Data Threat Report.

A remarkable 88% of respondents also admitted to feeling vulnerable to threats, with 9.1% feeling “extremely vulnerable”. This is significantly higher than the number actually experiencing data breaches.

26% of respondents reported their organisations had experienced a breach in the last year, a notable increase from 21.7% in 2016.

In addition to this, more than two in three respondents (67.8%) said they have previously experienced a data breach, an increase of almost 7% from 2016.

Garrett Bekker, principal analyst for information security at 451 Research, said: “These distressing breach rates serve as stark proof that data on any system can be attacked and compromised.”

One encouraging result found that the number of US-specific data breaches has started to fall.

Bekker expanded: “The good news: Only 19% of US retail respondents reported being breached last year, significantly less than the global average.”

Another positive finding was that 73% of respondents, up from 58% in 2016, predicted that security spending would increase over the next year.
 
With Lloyd’s of London estimating that a major cyber-attack could cost the global economy $53 billion, increased spending is advisable, if not directly proportionate to this figure, certainly significantly heightened based on recent security scares.

Over the past few years at least, security budgets have been regularly reported to be on the rise, but the commitment needs careful planning.

Bekker said: “Unfortunately, organisations keep spending on the same security solutions that worked for them in the past, but aren’t necessarily the most effective at stopping modern breaches.”

Firms should use their increased budgets wisely, firstly identifying their weak points before they begin allocating resource.

WeLiveSecurity

You Might Also Read: 

Cybercrime Is A Boardroom Issue:

FBI’s Cybercrime Report 2017:

 

« London Police Hampered By Encryption
@Home With iRobots »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Athena Forensics

Athena Forensics

Athena Forensics is one of the UK's leading providers of Computer Forensics, Mobile Phone Forensics, Cell Site Analysis and Expert Witness Services.

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Cyber Tec Security

Cyber Tec Security

Cyber Tec Security is an IASME Certification Body for Cyber Essentials basic/Plus. We also provide ongoing Managed Security Services.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

Argentra

Argentra

Argentra is a specialist engineering company, we have years of experience developing custom security software and providing security risk consulting.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.