Technical Debt Is A Serious Threat To Innovation

As businesses struggle to rebuild following the challenges of the past year, technical debt has emerged as a major roadblock to innovation and recovery, especially for enterprises focused on growth.  Technical debt is a technical design or development choice made for short-term benefit with long-term consequences. Across industries, this results from the development of solutions implemented quickly to maximise speed, rather than optimising for the future. 
 
A significant number of cyber attacks use and exploit known technology that often could be easily fixed by patching older software and replacing older computing machines and systems. But that costs money, and legislation will likely be needed to force companies to make these fixes sooner rather than later or not until they are hacked.
 
Based on a global survey of 500 IT leaders, the report by software platform firm OutSystems highlights the challenges companies face as they confront the many causes of technical debt, including pressure to meet deadlines, constant change in the marketplace and outdated technology.
 
Key findings of the report include:  
 
  • A majority (69%) of IT leaders say technical debt poses a fundamental limit on their ability to innovate, along with 61% saying it drags on their company’s performance and 64%agreeing it will continue to have a major impact in the future.
  • There is a massive opportunity cost for businesses of all sizes across all industries as they dedicate time, money, and other resources into technical debt instead of innovation. On average, businesses spend approximately one-third of their IT budget addressing technical debt - this jumps to 41% for enterprises.
  • There isn’t a sole cause of technical debt, though IT leaders cite too many development languages/frameworks (52%), turnover within the development team (49%), and accepting known defects to meet release deadlines (43%).
  • Businesses continue to delay addressing technical debt, further exacerbating the issue. Only 20% say tech debt is something they’re currently managing well, though 36% report they’ll be able to manage tech debt in the future.
  • Technical debt compounds as companies grow. Enterprises spend 41% of their IT budget on technical debt, while small businesses spend 27%.
“Technical debt can be particularly costly in the financial services industry, where companies thrive on their ability to innovate while providing fast and reliable services,” said Izak Joubert, JTC Group CTO. “Within JTC Americas, we’ve worked with OutSystems for years to develop software products that streamline financial transactions for our customers. They’ve helped us move beyond concerns about technical debt so we can focus on creating software that is predictable and secure as well as quick and easy to update.” 
 
“For years we’ve seen the negative impact of technical debt on businesses' ability to prioritise innovation and flexibility, which are critical elements to gaining and maintaining a competitive edge,” said Rui Gonçalves, Partner at KPMG in Portugal.  “Through the longstanding partnership between KPMG and OutSystems, we’ve witnessed the significant capabilities that modern application development offers in terms of eliminating technical debt as well as empowering businesses to shift their resources toward innovation in a meaningful, successful way.” he added
 
Methodology
 
Findings in “The Growing Threat of Technical Debt” are based on a global survey of 500 IT leaders spanning enterprises, commercial companies, and small businesses around the globe. Fielded in partnership with Lucid, the online survey was conducted in May 2021 across the United States, Australia, the United Kingdom, France, Germany, Portugal, India, Brazil, the United Arab Emirates, and Singapore. Respondents span industries including finance, retail, healthcare, education, business services, government and public administration, media and telecommunications, utilities, and real estate. 
 
Outsystems        DefenseOne:  
 
You Might Also Read: 
 
Business Cyber Security Strategy (£):
 
 
« Pentagon CISO Accused Of Leaking Classified Intel
$70m Ransom Demand To Restore Hacked Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Defimoon

Defimoon

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.