SHARE
Facebook X Pinterest WhatsApp

Cyber-Attacks Prompt Security Pros to Take Action

Security Breaches Are Widespread 76% experienced a damaging security breach in the last year. Only 14% reported no “notable” security breaches. Top Security Risks Eight out of 10 said end users with malware and viruses are the biggest risk to security, followed by password compromise and cyber-attacks. Prevention Tops IT Issues 50% consider preventing cyber-attacks […]

Written By
thumbnail Gina Roos
Gina Roos
May 12, 2015
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security

1 - Breaches Are WidespreadBreaches Are Widespread

76% experienced a damaging security breach in the last year. Only 14% reported no “notable” security breaches.

2 - Top Security RisksTop Security Risks

Eight out of 10 said end users with malware and viruses are the biggest risk to security, followed by password compromise and cyber-attacks.

3 - Prevention Tops IT IssuesPrevention Tops IT Issues

50% consider preventing cyber-attacks the most important, or at least one of the top three, IT issues. Only 20% do not consider cyber-attacks a major issue.

4 - Data LeaksData Leaks

71% reported that sensitive information was compromised as a result of a breach.

5 - Action PlansAction Plans

Nearly 50% of respondents added or reviewed security solutions for updates after their last serious breach, followed by establishing or updating security best practices (45%).

6 - Bigger BudgetsBigger Budgets

44% of respondents increased their IT security budgets after a breach.

7 - Trusted VendorsTrusted Vendors

Eight in 10 respondents are familiar with Symantec and Microsoft, and four in 10 use them for protection against cyber-attacks.

8 - The Big ThreeThe Big Three

44% of respondents believe Symantec offers the most comprehensive protection against cyber-attacks, followed by Cisco (36%) and Intel’s McAfee (32%).

9 - Tech Partner SelectionTech Partner Selection

Nine in 10 respondents rate systems reliability and tech expertise as most important at the evaluation and request for proposal (RFP) stages in the purchasing process for IT security products.

10 - Seeking InformationSeeking Information

75% rated tech content sites and peers/colleagues as the most important sources for security information, followed by analysts (59%), print pubs (47%), tech blogs/pundits (46%) and IT manufacturer sites (45%).

11 - Buyer ResourcesBuyer Resources

65% of respondents rated product sheets as the most important sources of information during the initial phase of a product evaluation. More than 50% said vendor comparison guides, white papers and product sheets are important.

12 - RFP and Product DemosRFP and Product Demos

During the RFP stage, 54% of respondents rated product demos as the most important source of information. More than 40% rated vendor comparison guides, case studies, face-to-face networking and product sheets as important.

Recommended for you...

RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.