SlideShare ist ein Scribd-Unternehmen logo
1 von 14
CompTIA’s

th
11

Annual

Information Security Trends
Most Companies Expect to Maintain
High Focus on Security
37%

Significantly Higher Priority

28%
44%

Moderately Higher Priority

51%
17%

No Change

Moderately or Significantly
Lower Priority

18%
2%
3%

2 Years from
Now Forecast
Compared to 2
Years Ago

Source: CompTIA’s 11th Annual Information Security Trends study
Base: 500 U.S. IT and business executives (aka end users) responsible for security
Assessing the Cybersecurity Landscape
Security Concern

Change in Trend

Moderate
Concern

Serious
Concern

No Change /
Less Critical
Today

Malware (e.g. viruses, worms, trojans, botnets, etc.)

38%

53%

52%

48%

Hacking (e.g. DoS attack, APT, etc.)

42%

44%

53%

47%

Social engineering/Phishing

45%

37%

62%

38%

Data loss/leakage

46%

35%

70%

30%

Understanding security risks of emerging areas, i.e.
cloud, mobile, social

49%

32%

61%

39%

Physical security threats (e.g. theft of a device)

42%

28%

72%

28%

Intentional abuse by insiders, i.e. staff, contractors

42%

26%

76%

24%

Lack/inadequate enforcement of company security
policy

45%

23%

77%

23%

Lack of budget/support for investing in security

42%

23%

76%

24%

Human error among IT staff

47%

22%

80%

20%

Human error among general staff

55%

21%

76%

24%

Security Threats

More
Critical
Today

Source: CompTIA’s 11th Annual Information Security Trends study
Base: 500 U.S. end users responsible for security
Security Defenses in Use
Data Loss Prevention

Large Firms
Medium Firms
Small Firms

71%
54%
55%
61%

Identity and Access Management

43%
39%
51%

Formal risk assessment

40%
35%
44%

Security Information and Event Management

37%
32%
41%

Enterprise Security Intelligence

34%
22%
40%

External Vulnerability Assessments

25%
28%
Source: CompTIA’s 11th Annual Information Security Trends study
Base: 500 U.S. end users responsible for security
Human Element a Major Part of Security Risk
Factors in
Security Breaches

Top Human Error Sources

Human
Error

55%

45%
Technology
Error

42%

End user failure to follow
policies and procedures

41%

IT staff failure to follow
policies and procedures

39%

Lack of security expertise
with website/applications

38%

Lack of security expertise
with IT infrastructure

Source: CompTIA’s 11th Annual Information Security Trends study
Base: 320 end users experiencing security breaches/244 end users with human error issues
Change in Security Approach
Over Past Two Years
51%
36%

View of
Drastic/Moderate
Change
by Job Function
70% Business Function

13%

69% IT Function
44% Executives

Drastic
amount of
change

Moderate
No
amount of change/small
change
amount of
change

Source: CompTIA’s 11th Annual Information Security Trends study
Base: 500 U.S. IT and business executives (aka end users) responsible for security
Formal Risk Analysis Not a Part of Security
Planning for Most Companies
Planning
to Use

Currently
Using

33%
41%

No plans/Not
familiar

26%

Source: CompTIA’s 11th Annual Information Security Trends study
Base: 500 U.S. end users responsible for security
Balancing Risk and Security
Reasons to Mitigate
Security Risk

Reasons to Accept
More Security Risk

66%

67% Nature of
emerging threats

66% Desire to use new
technology

56% Result of security
evaluation

63% Changing security
landscape

50% New business
model/offerings

53% Potential business
benefits

18%

17%

Too Much Appropriate Security
Balance Too Stringent
Risk
Source: CompTIA’s 11th Annual Information Security Trends study
Base: 500 U.S. IT and business executives (aka end users) responsible for security
Rating of Workforce Security Mindset

44%

48%

8%
Advanced –
Understand Policies
and Try to Stay
Compliant

Basic –
Unfamiliar with
Some Details but
Generally Aware

Low Priority –
More Focused on
Work Tasks and Less
on Security

Source: CompTIA’s 10th Annual Information Security Trends study
Base: 306 end users experiencing security breaches over past year
Changes on the Technology Landscape
Affecting Security
Rise of social networking

52%

Cloud Computing

51%

Availability of easy-to-use hacking tools

49%

Interconnectivity of devices/systems

48%

Sophistication of security threats

47%

Growing organization of hackers

47%

Volume of security threats
Consumerization of IT

39%
33%
Source: CompTIA’s 11th Annual Information Security Trends study
Base: 500 U.S. IT and business executives (aka end users) responsible for security
Review of Cloud Provider Security
Amount of Review Done by End Users

Areas Reviewed by End Users
• Identity and access management
• BC/DR plans of cloud provider
• Data integrity assurances

40%

• Data encryption at rest and in transit
29%

14%
Little/None/ Moderate
Don’t Know

• Data and backup retention policies
• Regulatory compliance of provider

Heavy

• Credentials held by provider
• Geographic location of data centers

17% say it depends on situation
Source: CompTIA’s 11th Annual Information Security Trends study
Base: 435 end users with cloud solutions
Mobile Security Incidents Within Businesses
Lost/stolen device

Mobile malware

Employees disabling security features

Mobile phishing attack

Violation of policy on corporate data

None of the above

2013
2012

39%
38%
28%
19%
26%
19%
24%
20%
23%
25%
31%
34%
Source: CompTIA’s 11th Annual Information Security Trends study
Base: 500 U.S. end users responsible for security
The Growing Threat of Data Loss
Experiencing Data Loss in the Past Year

Types of Data Lost

55%

50%
25%

Data about employees
Intellectual property

28%

Definitely

43%
42%

19%

Corporate financial data

Customer data

22%

Believe data was lost, but not
sure which data

Probably

6%
Don’t
Know

No

Yes

Source: CompTIA’s 11th Annual Information Security Trends study
Base: 500 end users/190 end users experiencing data loss
As the voice of the IT industry, CompTIA has hundreds
of tools, market intelligence reports and business
training programs to help IT organizations grow through
education, certification, advocacy and philanthropy.
Check it out at www.comptia.org.
Want to know about our research on the IT workforce?
Visit http://www.comptia.org/research/it-workforce.aspx.

comptia.org

Want to know more?

Weitere ähnliche Inhalte

Was ist angesagt?

Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on Innovation
Silicon Valley Bank
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
Tony Moroney
 

Was ist angesagt? (19)

The Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilityThe Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP Mobility
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Microsoft Power Point Information Security And Risk Managementv2
Microsoft Power Point   Information Security And Risk Managementv2Microsoft Power Point   Information Security And Risk Managementv2
Microsoft Power Point Information Security And Risk Managementv2
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
A Rise of Citizen Application Developers
A Rise of Citizen Application DevelopersA Rise of Citizen Application Developers
A Rise of Citizen Application Developers
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on Innovation
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016
 
Human Agency on Algorithmic Systems
Human Agency on Algorithmic SystemsHuman Agency on Algorithmic Systems
Human Agency on Algorithmic Systems
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 

Ähnlich wie CompTIA 11th Annual Information Security Trends

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
Fiona Lew
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 

Ähnlich wie CompTIA 11th Annual Information Security Trends (20)

Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
State of Security
State of SecurityState of Security
State of Security
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 

Mehr von CompTIA

Mehr von CompTIA (20)

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

CompTIA 11th Annual Information Security Trends

  • 2. Most Companies Expect to Maintain High Focus on Security 37% Significantly Higher Priority 28% 44% Moderately Higher Priority 51% 17% No Change Moderately or Significantly Lower Priority 18% 2% 3% 2 Years from Now Forecast Compared to 2 Years Ago Source: CompTIA’s 11th Annual Information Security Trends study Base: 500 U.S. IT and business executives (aka end users) responsible for security
  • 3. Assessing the Cybersecurity Landscape Security Concern Change in Trend Moderate Concern Serious Concern No Change / Less Critical Today Malware (e.g. viruses, worms, trojans, botnets, etc.) 38% 53% 52% 48% Hacking (e.g. DoS attack, APT, etc.) 42% 44% 53% 47% Social engineering/Phishing 45% 37% 62% 38% Data loss/leakage 46% 35% 70% 30% Understanding security risks of emerging areas, i.e. cloud, mobile, social 49% 32% 61% 39% Physical security threats (e.g. theft of a device) 42% 28% 72% 28% Intentional abuse by insiders, i.e. staff, contractors 42% 26% 76% 24% Lack/inadequate enforcement of company security policy 45% 23% 77% 23% Lack of budget/support for investing in security 42% 23% 76% 24% Human error among IT staff 47% 22% 80% 20% Human error among general staff 55% 21% 76% 24% Security Threats More Critical Today Source: CompTIA’s 11th Annual Information Security Trends study Base: 500 U.S. end users responsible for security
  • 4. Security Defenses in Use Data Loss Prevention Large Firms Medium Firms Small Firms 71% 54% 55% 61% Identity and Access Management 43% 39% 51% Formal risk assessment 40% 35% 44% Security Information and Event Management 37% 32% 41% Enterprise Security Intelligence 34% 22% 40% External Vulnerability Assessments 25% 28% Source: CompTIA’s 11th Annual Information Security Trends study Base: 500 U.S. end users responsible for security
  • 5. Human Element a Major Part of Security Risk Factors in Security Breaches Top Human Error Sources Human Error 55% 45% Technology Error 42% End user failure to follow policies and procedures 41% IT staff failure to follow policies and procedures 39% Lack of security expertise with website/applications 38% Lack of security expertise with IT infrastructure Source: CompTIA’s 11th Annual Information Security Trends study Base: 320 end users experiencing security breaches/244 end users with human error issues
  • 6. Change in Security Approach Over Past Two Years 51% 36% View of Drastic/Moderate Change by Job Function 70% Business Function 13% 69% IT Function 44% Executives Drastic amount of change Moderate No amount of change/small change amount of change Source: CompTIA’s 11th Annual Information Security Trends study Base: 500 U.S. IT and business executives (aka end users) responsible for security
  • 7. Formal Risk Analysis Not a Part of Security Planning for Most Companies Planning to Use Currently Using 33% 41% No plans/Not familiar 26% Source: CompTIA’s 11th Annual Information Security Trends study Base: 500 U.S. end users responsible for security
  • 8. Balancing Risk and Security Reasons to Mitigate Security Risk Reasons to Accept More Security Risk 66% 67% Nature of emerging threats 66% Desire to use new technology 56% Result of security evaluation 63% Changing security landscape 50% New business model/offerings 53% Potential business benefits 18% 17% Too Much Appropriate Security Balance Too Stringent Risk Source: CompTIA’s 11th Annual Information Security Trends study Base: 500 U.S. IT and business executives (aka end users) responsible for security
  • 9. Rating of Workforce Security Mindset 44% 48% 8% Advanced – Understand Policies and Try to Stay Compliant Basic – Unfamiliar with Some Details but Generally Aware Low Priority – More Focused on Work Tasks and Less on Security Source: CompTIA’s 10th Annual Information Security Trends study Base: 306 end users experiencing security breaches over past year
  • 10. Changes on the Technology Landscape Affecting Security Rise of social networking 52% Cloud Computing 51% Availability of easy-to-use hacking tools 49% Interconnectivity of devices/systems 48% Sophistication of security threats 47% Growing organization of hackers 47% Volume of security threats Consumerization of IT 39% 33% Source: CompTIA’s 11th Annual Information Security Trends study Base: 500 U.S. IT and business executives (aka end users) responsible for security
  • 11. Review of Cloud Provider Security Amount of Review Done by End Users Areas Reviewed by End Users • Identity and access management • BC/DR plans of cloud provider • Data integrity assurances 40% • Data encryption at rest and in transit 29% 14% Little/None/ Moderate Don’t Know • Data and backup retention policies • Regulatory compliance of provider Heavy • Credentials held by provider • Geographic location of data centers 17% say it depends on situation Source: CompTIA’s 11th Annual Information Security Trends study Base: 435 end users with cloud solutions
  • 12. Mobile Security Incidents Within Businesses Lost/stolen device Mobile malware Employees disabling security features Mobile phishing attack Violation of policy on corporate data None of the above 2013 2012 39% 38% 28% 19% 26% 19% 24% 20% 23% 25% 31% 34% Source: CompTIA’s 11th Annual Information Security Trends study Base: 500 U.S. end users responsible for security
  • 13. The Growing Threat of Data Loss Experiencing Data Loss in the Past Year Types of Data Lost 55% 50% 25% Data about employees Intellectual property 28% Definitely 43% 42% 19% Corporate financial data Customer data 22% Believe data was lost, but not sure which data Probably 6% Don’t Know No Yes Source: CompTIA’s 11th Annual Information Security Trends study Base: 500 end users/190 end users experiencing data loss
  • 14. As the voice of the IT industry, CompTIA has hundreds of tools, market intelligence reports and business training programs to help IT organizations grow through education, certification, advocacy and philanthropy. Check it out at www.comptia.org. Want to know about our research on the IT workforce? Visit http://www.comptia.org/research/it-workforce.aspx. comptia.org Want to know more?

Hinweis der Redaktion

  1. Security is a top priority for firms among many different IT initiatives, and many firms expect to increase their focus in this area over the next to years. For all this focus, though, companies may not be analyzing their security situation as thoroughly as possible.
  2. Malware and hacking continue to be the top security concerns. Given the wide range of threats today, companies should take a more balanced view of the different ways they can be attacked, paying special attention to the threat of human error.
  3. There is also not much adoption in a range of new security defenses or techniques beyond DLP. Especially for smaller businesses, these new tools can address areas of exposure brought on by usage of new technology.
  4. Even though companies do not cite human error as a major concern, it accounts for over half of the root cause of security breaches. This is generally not malicious activity but simply a lack of awareness for policies and procedures.
  5. Although 82% of businesses feel that their security systems are completely or mostly satisfactory, they may be basing this on historical activity. With only 13% of companies drastically changing their security approach over the past two years (a time of major technology disruption), many firms may want to refresh their analysis.
  6. Formal risk assessment has become a necessary part of security planning as it is impossible to keep all corporate data behind a firewall. Companies need to assess which data they could allow in public cloud providers and on mobile devices.
  7. As with the view on overall security, a more robust examination of risk tolerance may lead to areas where more risk can be accepted or security needs to be tightened up.
  8. Addressing the human element begins with raising the level of security literacy across the entire workforce. Over half of all companies believe that their workforce may have a lower understanding of policy, which can lead to mistakes when faced with new situations.
  9. Many organizations are beginning to use new technology first and worry about the security implications later. This is especially true when it comes to cloud computing, mobility, and Big Data.
  10. A first step in securing cloud data is understanding what steps a cloud provider takes for security. From there, companies can add on the pieces they need to ensure that their assets are secure.
  11. Although incidence of mobile malware has risen rapidly in the past year, many companies still do not list it as a top concern (lost/stolen device takes that spot). As different kinds of mobile attacks increase, companies will need to build the skills needed for mobile security.
  12. The reliance on digital data and the interest in Big Data solutions has increased the focus on data security. Many companies need to start with basic data management, as shown by the fact that 22% of companies believe data has been lost over the past year but do not know which data has been compromised.