SHARE
Facebook X Pinterest WhatsApp

Channel Could Help Spur Security Adoption in 2014

Security Focus on Security Increases The importance of security has grown considerably over the last two years. Significantly higher priority: 28%, moderately higher priority: 51%, no change: 18%, lower priority: 3% Top Five Security Threats A diverse number of types of threats need to be defended against. Malware: 91%, hacking: 86%, social engineering/phishing: 82%, data loss/leakage: 81%, security risks […]

Written By
thumbnail Michael Vizard
Michael Vizard
Dec 20, 2013
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security

1 - Focus on Security IncreasesFocus on Security Increases

The importance of security has grown considerably over the last two years. Significantly higher priority: 28%, moderately higher priority: 51%, no change: 18%, lower priority: 3%

2 - Top Five Security ThreatsTop Five Security Threats

A diverse number of types of threats need to be defended against. Malware: 91%, hacking: 86%, social engineering/phishing: 82%, data loss/leakage: 81%, security risks in emerging technologies: 81%

3 - Security Defenses in Use at Large OrganizationsSecurity Defenses in Use at Large Organizations

Data loss prevention (DLP) tends to be more important for larger organizations.Data loss prevention: 71%, identity and access management: 61% , formal risk assessment: 51%, security information and event management: 44%, enterprise security intelligence: 41%, external vulnerability assessments: 40%

4 - Security Defenses in Use at Midsize OrganizationsSecurity Defenses in Use at Midsize Organizations

Use of more complex security technologies is not that high. Data loss prevention: 54%, identity and access management: 43%, formal risk assessment: 40%, security information and event management: 37%, enterprise security intelligence: 34%, external vulnerability assessments: 25%

5 - Security Defenses in Use at Small OrganizationsSecurity Defenses in Use at Small Organizations

Adoption of advanced security technologies in small organizations is relatively light.Data loss prevention: 55%, identity and access management: 39%, formal risk assessment: 35%, security information and event management: 32%, enterprise security intelligence: 22%, external vulnerability assessments: 28%

6 - Factors in Security BreachesFactors in Security Breaches

Human error is more often the cause but not by much.Human error: 55%, technology error: 45%

7 - Causes of Human Security ErrorCauses of Human Security Error

It’s hard to discern how much IT complexity contributes to human error. End-user failure to follow policies and procedures: 42%, IT staff failure to follow policies and procedures: 41%, lack of security expertise with Website/applications: 39%, lack of security expertise with IT infrastructure: 38%

8 - Change in Security Posture in Last Two YearsChange in Security Posture in Last Two Years

When it comes, IT security change is unfortunately evolutionary at best. Moderate amount of change: 51%, no change/small amount of change: 36%, drastic amount of change: 13%

9 - Formal Risk Analysis Is LackingFormal Risk Analysis Is Lacking

Risk analysis is a potential lucrative area for solution providers in the channel.Companies currently using: 41%, companies planning to use: 33%, no plans/not familiar: 25%

10 - Balancing Risk vs. SecurityBalancing Risk vs. Security

Convincing customers they don’t have enough security can be a challenge. Appropriate balance: 66%, too much risk: 18%, security too stringent: 17%

11 - Security Mindset of the WorkforceSecurity Mindset of the Workforce

Over the years, security awareness has significantly improved but is still imperfect. Basic: 48%, advanced: 44%, low priority: 8%

12 - Changes in IT Landscape Affecting SecurityChanges in IT Landscape Affecting Security

A lot of security factors are outside the control of IT. Social networking: 52%, cloud computing: 51%, availability of easy-to-use hacking tools: 49%, interconnectivity of devices/systems: 48%, sophistication of security threats: 47%, growing organization of hackers: 47%

13 - Mobile Security IncidentsMobile Security Incidents

Mobile malware and employees disabling features are up the most year-over-year. Lost/stolen device: 39%, mobile malware: 28%, employees disabling security features: 26%, mobile phishing attack: 24%, violation of corporate data policy: 23%

thumbnail Michael Vizard

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a writer for publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.