What’s really going on inside the networks of today’s largest organizations? To find out, we anonymously poll IT administrators, managers and executives from organizations of all sizes, vertical markets and regions.
State-Sponsored Cyber Attacks
Here’s a snapshot of current trends in privileged access, advanced persistent threats, cloud computing, IT outsourcing and BYOD - as told to us by today’s top professionals:
- More than 1 out of 5 respondents are no longer confident that perimeter security tools react quickly enough to stop APTs.
- 58% are not confident that their network has never been breached by a foreign state sponsored attack or an advanced persistent threat.
- 59% think a state-sponsored attacker will attempt to breach their organization in the next six months.
- 48% do not think their IT staff can detect the presence of an attacker who attempts to breach the network or extract private data.
Information Security - 2014
- More than 13% of IT security professionals can access previous employers’ systems using their old credentials.
- More than 16% of those say they can still access systems at all previous employers.
- More than 16% of respondents say their organization does not have a policy that ensures ex-contractors can no longer access corporate systems, or they are not aware of one.
- 79.64% of survey respondents choose to keep their sensitive data on their organization's network, rather than the cloud.
- 33.21% of those surveyed said the thought of government snooping deters them from keeping data in the cloud.
- 74.55% of respondents think that the cloud applications their users download cause security headaches.
Information Security - 2013
- 73.3% of respondents would not bet $100 of their own money that their company won't suffer a data breach in the next six months.
- 32.3% work in organizations that do not have a policy to change default passwords when deploying new hardware, applications and network appliances.
- 81.4% think that staff tend to ignore the rules that IT departments put in place.
- 52.2% believe that staff would not listen more even if IT directives came from executive management, rather than IT.
- 75.8% think that employees in their organization have access to information that they don't necessarily need to perform their jobs.
Information Security - 2012
- 39 percent of IT staff can get unauthorized access to their organization’s most sensitive information – including the CEO’s data.
- 68 percent of respondents believe that as an IT professional they have more access to sensitive data than people in other departments.
- 20 percent of IT professionals have already exploited their privileged access.
- 11 percent of respondents would use their access to sensitive data if they were laid off.
- 42% of respondents claim that costs of their outsourcing agreements were higher than originally planned.
- 64% suspect that their outsourcers made up work to earn extra money.
- 67% of respondents think that BYOD increases IT security costs.
- 43% of respondents worry that BYOD could lead to virus infection.