SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Vanson Bourne, Summer 2013
Interviews with 100 IT decision-makers from organisations with more than
1,000 employees, across a range of commercial sectors in the UK
Research snapshot –
A corporate view of
IT Security Threats
Delivering IT security is becoming more complicated…
Source: Vanson BourneOrganisations who feel that delivering IT security is a more complicated task than previously
Seven in ten organisations
acknowledge that delivering
IT security is more
complicated than before
Organisations who have increased
their spend on IT security are twice
as likely to find delivering IT security
more complicated than
previously, when compared with
organisations who have not increased
their spend
82% 41%
Increased spend on IT
security
Not increased spend on
IT security
Security protocols
and security
providers/partners
Neither
70%
46%
Organisations who do not have a
formal process for reviewing their
security protocols and security
providers/partners are less likely to
be aware of the challenges of
delivering IT security, compared to
organisations who do have formal
process in place
Source: Vanson BourneOrganisations who do not feel they are 100% protected against security threats
…With many organisations exposed to security threats
On average eight in ten
organisations do not feel that
they are 100% protected
against security threats
Enterprise organisations are most
likely to feel that they are not
completely protected against security
threats, with nine in ten reporting
as such
Medium-sized
organisations
Enterprise
organisations
90% 72%
RD&T
64% 88%
Although finance organisations are the most likely to
be confident that they are protected against all
security threats, almost two thirds of organisations in
this sector are still not protected
Services
& Utilities
84%
Finance Manufacturing
88%
Malware as a threat to IT security
Source: Vanson BourneOrganisations perceived threats to IT security (malware)
Eight in ten organisations feel
that malware provides a threat
to IT security…
… Yet only one in ten are
entirely confident that their
organisation is protected from
malware issues
Organisations who have increased their
spend on IT security are almost three
times more likely to feel completely
protected against malware, compared to
organisations who have not increased their
spending
19% 7%
Increased spend on IT
security
Not increased spend on
IT security
Finance
20%8%
Finance organisations are half as likely to be
entirely protected against malware issues
than organisation in the services and utilities
sector
Services
& Utilities
The use of personal cloud
storage presents IT security
threats to seven in ten
organisations
Source: Vanson BourneOrganisations perceived threats to IT security (personal cloud storage)
Less than one in ten enterprise
organisations are entirely confident
that they have the necessary control
and protection in place to completely
remove any threats from personal
cloud storage
RD&TManufacturingMedium-sized
organisations
Services
& Utilities
Enterprise
organisations Finance
8% 12%
76% 68% 68% 68%
More than three quarters of organisations in the
finance sector feel that the use of personal cloud
storage presents IT security threats
Personal cloud storage as a threat to IT security
Source: Vanson BourneOrganisations knowledge of previous cyber threats and attacks they have faced
But are organisations aware of cyber threats and attacks?
Three quarters of
organisations agree that they
cannot be 100% certain they
know of every cyber threat or
attack they have faced
75%
Organisations who spend less than 5% of their IT
budget on security are most likely to feel that they
cannot be 100% certain they know of all cyber
threats and attacks they have faced
83%
Spend less than 5% of
IT budget on security
73%
Spend 5% - 10% of IT
budget on security
69%
Spend more than 10%
of IT budget on security Enterprise
organisations RD&T
84%
84%
More than eight in ten enterprise size
organisations and organisations in the
retail, distribution and transport sector
are not certain they know of all cyber
threats and attacks they faced
www.vansonbourne.com
Email: enquiries@vansonbourne.com
Tel: 01635 550449
Follow us on Twitter and LinkedIn
If you’d like to know more….
About our global B2B and B2C technology research services
Research snapshot –
A corporate view of
IT Security Threats
Vanson Bourne, Summer 2013

Weitere ähnliche Inhalte

Mehr von Vanson Bourne

Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne
 
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne
 
Vanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne
 
Shadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesShadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesVanson Bourne
 
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne
 
Vanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne
 
Vanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne
 
Vanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne
 
At a glance - A corporate view of 4G
At a glance - A corporate view of 4GAt a glance - A corporate view of 4G
At a glance - A corporate view of 4GVanson Bourne
 
Research snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GResearch snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GVanson Bourne
 
Research snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyResearch snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyVanson Bourne
 

Mehr von Vanson Bourne (20)

Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable Tech
 
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable Tech
 
Vanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents Infographic
 
Shadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesShadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast Slides
 
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBM
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress Software
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTT
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter Novelli
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile Strategy
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market Research
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech Marketing
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT Security
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013
 
Vanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social Media
 
Vanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology Marketing
 
Vanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT Security
 
At a glance - A corporate view of 4G
At a glance - A corporate view of 4GAt a glance - A corporate view of 4G
At a glance - A corporate view of 4G
 
Research snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GResearch snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4G
 
Research snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyResearch snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategy
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Research snapshot - A corporate view of IT Security Threats

  • 1. Vanson Bourne, Summer 2013 Interviews with 100 IT decision-makers from organisations with more than 1,000 employees, across a range of commercial sectors in the UK Research snapshot – A corporate view of IT Security Threats
  • 2. Delivering IT security is becoming more complicated… Source: Vanson BourneOrganisations who feel that delivering IT security is a more complicated task than previously Seven in ten organisations acknowledge that delivering IT security is more complicated than before Organisations who have increased their spend on IT security are twice as likely to find delivering IT security more complicated than previously, when compared with organisations who have not increased their spend 82% 41% Increased spend on IT security Not increased spend on IT security Security protocols and security providers/partners Neither 70% 46% Organisations who do not have a formal process for reviewing their security protocols and security providers/partners are less likely to be aware of the challenges of delivering IT security, compared to organisations who do have formal process in place
  • 3. Source: Vanson BourneOrganisations who do not feel they are 100% protected against security threats …With many organisations exposed to security threats On average eight in ten organisations do not feel that they are 100% protected against security threats Enterprise organisations are most likely to feel that they are not completely protected against security threats, with nine in ten reporting as such Medium-sized organisations Enterprise organisations 90% 72% RD&T 64% 88% Although finance organisations are the most likely to be confident that they are protected against all security threats, almost two thirds of organisations in this sector are still not protected Services & Utilities 84% Finance Manufacturing 88%
  • 4. Malware as a threat to IT security Source: Vanson BourneOrganisations perceived threats to IT security (malware) Eight in ten organisations feel that malware provides a threat to IT security… … Yet only one in ten are entirely confident that their organisation is protected from malware issues Organisations who have increased their spend on IT security are almost three times more likely to feel completely protected against malware, compared to organisations who have not increased their spending 19% 7% Increased spend on IT security Not increased spend on IT security Finance 20%8% Finance organisations are half as likely to be entirely protected against malware issues than organisation in the services and utilities sector Services & Utilities
  • 5. The use of personal cloud storage presents IT security threats to seven in ten organisations Source: Vanson BourneOrganisations perceived threats to IT security (personal cloud storage) Less than one in ten enterprise organisations are entirely confident that they have the necessary control and protection in place to completely remove any threats from personal cloud storage RD&TManufacturingMedium-sized organisations Services & Utilities Enterprise organisations Finance 8% 12% 76% 68% 68% 68% More than three quarters of organisations in the finance sector feel that the use of personal cloud storage presents IT security threats Personal cloud storage as a threat to IT security
  • 6. Source: Vanson BourneOrganisations knowledge of previous cyber threats and attacks they have faced But are organisations aware of cyber threats and attacks? Three quarters of organisations agree that they cannot be 100% certain they know of every cyber threat or attack they have faced 75% Organisations who spend less than 5% of their IT budget on security are most likely to feel that they cannot be 100% certain they know of all cyber threats and attacks they have faced 83% Spend less than 5% of IT budget on security 73% Spend 5% - 10% of IT budget on security 69% Spend more than 10% of IT budget on security Enterprise organisations RD&T 84% 84% More than eight in ten enterprise size organisations and organisations in the retail, distribution and transport sector are not certain they know of all cyber threats and attacks they faced
  • 7. www.vansonbourne.com Email: enquiries@vansonbourne.com Tel: 01635 550449 Follow us on Twitter and LinkedIn If you’d like to know more…. About our global B2B and B2C technology research services
  • 8. Research snapshot – A corporate view of IT Security Threats Vanson Bourne, Summer 2013