SHARE
Facebook X Pinterest WhatsApp

Survey: IT Security Breaches More Severe

The severity of security breaches is climbing at a time when IT organizations are under pressure to cut expenses and work with smaller budgets. But the good news is that IT security remains a major priority among IT professionals. A total of 38 percent of U.S.-based IT professionals ranked IT security as their top priority. […]

Written By
thumbnail Jessica Davis
Jessica Davis
Jun 9, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The severity of security breaches is climbing at a time when IT
organizations are under pressure to cut expenses and work with smaller
budgets.

But the good news is that IT security remains a major priority among IT
professionals. A total of 38 percent of U.S.-based IT professionals
ranked IT security as their top priority. That’s according to this
year’s State of IT Security survey of 1,500 IT professionals in the
United States, U.K., China and India, commissioned by CompTIA.

“The vulnerabilities have always been there,” Tim Herbert, vice
president of research at CompTIA tells Channel Insider. And because of
the recession “there has been an increase in the financial incentive to
steal data. More people are leaving organizations through potential
layoffs, buyouts and whatnot. It’s not necessarily malicious, but
people want to take their contact information with them.”

Other new vulnerabilities come from the increased use of smartphones by
employees and also from more employees accessing social networking
sites such as Facebook and Twitter.

“When used inappropriately these can also lead to problems,” Herbert says, pointing out the recent Twitter virus.

While data confirms that the number of security breaches has not
increased significantly, the severity level of breaches has been
trending upwards, Herbert says.

Survey respondents rated breach severity on a scale of 1 to 10. In 2006
the average severity ranked 4.8, in 2007 5.3 and in 2008 5.6.

For 2008, the mean total cost of security breaches came in at $85,161 while the median chosen was $5,000 to $9,999.

Survey respondents who reported breaches over during 2008 said the total cost of the breaches was as follows:

  • $0  – 9 percent
  • $1 to $499 – 8 percent
  • $500 to $999 – 7 percent
  • $1,000 to $4,999 – 19 percent
  • $5000 to $9,999 – 19 percent
  • $10,000 to $49,999 – 16 percent
  • $50,000 to $99,999 –     12 percent
  • $100,000 to $999,999 – 7 percent
  • $1 million  or more – 3 percent

Most often, breaches are caused by the combination of technical
glitches together with human error. Perhaps an employee leaves a laptop
at airport security, and that laptop does not have data locked down
with a password or other security measure.

That’s why having a written IT security policy that includes mobile
devices is so essential to ensuring an organization’s IT security, says
Herbert. More companies are implementing such policies, and more
companies are making sure that they include mobile devices in the
policies. However, the likelihood of a company having such a policy
depends on the company’s size.  

Herbert recommends that companies periodically review security policies
with employees and make sure that non-IT employees are trained in
proper IT security procedures to protect against the potential for
breaches.

 

Recommended for you...

Scale Computing Makes Strategic Updates to HyperCore Solution
Jordan Smith
Sep 17, 2025
Druva Launches Metadata Graphing & New Agentic AI Solutions
Jordan Smith
Sep 17, 2025
SonicWall’s Michael Crean on State of Managed Security
Victoria Durgin
Sep 17, 2025
Gigamon Unveils Agentic AI App to Boost IT Productivity
Luis Millares
Sep 16, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.