IT Professionals Step Up Security Protection

IT Professionals Step Up Security Protection IT Professionals Step Up Security Protection In a new survey, a little more than seven in 10 IT pros expect their firms to be more secure in 2016. Their biggest concerns are malware and ransomware. Biggest Security Concerns 54% are very or extremely concerned about malware in 2016, followed […]

Written By: Gina Roos
Dec 31, 2015
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

IT Professionals Step Up Security Protection

IT Professionals Step Up Security ProtectionIT Professionals Step Up Security Protection

In a new survey, a little more than seven in 10 IT pros expect their firms to be more secure in 2016. Their biggest concerns are malware and ransomware.

Biggest Security ConcernsBiggest Security Concerns

54% are very or extremely concerned about malware in 2016, followed by ransomware (53%), phishing (46%), data leaks/thefts (39%), spyware (38%) and password breaches (37%).

Actual ThreatsActual Threats

51% said their organizations experienced a malware attack in 2015, followed by phishing (38%), spyware (34%), ransomware (20%) and password breaches (12%). Only 18% experienced no threats or attacks.

Vulnerable DevicesVulnerable Devices

81% pointed to laptops as the devices with a moderate or high risk of breach, followed by desktops (73%), smartphones (70%), servers/server rooms (49%), IoT devices (49%), wireless access points (47%), tablets (42%), and routers/switches (38%).

In the ShadowsIn the Shadows

48% of respondents believe that shadow IT poses a security threat to the organization.

Who's the Biggest Threat?Who’s the Biggest Threat?

49% believe independent hackers were the biggest threat in 2015, followed by rogue employees (36%), organized crime (25%), cyber-terrorists (12%) and hacktivists (10%).

Threat ProtectionThreat Protection

76% said they update hardware/software to protect against threats, enforce end-user policies (73%), educate end users (72%), restrict or manage access to corporate resources (69%), learn about new risks/threats (66%), monitor network activity/identify patterns (61%), evaluate new/additional solutions (60%) and restrict BYOD (52%).

Policies CountPolicies Count

86% of respondents have an end-user initiative in place, and 68% have a formal IT security policy.

Top Security ChallengesTop Security Challenges

69% said limited end-user knowledge regarding risk/security is one of their biggest security challenges, followed by end-user resistance (57%), lack of time/resources to secure networks (54%), inadequate budget for security solutions (46%), limited knowledge about potential threats (35%) and lack of support from management for security initiatives (32%).

Making InvestmentsMaking Investments

84% of respondents expect security investments to increase in at least one area, with 71% expecting their organizations to be more secure in 2016.

Taking ResponsibilityTaking Responsibility

87% said they are most responsible for keeping organizations safe, but noted that everyone, including individual employees (43%) and high-level executives (41%), has a role to play.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance

Sherweb launches CyberMSP Community, offering MSPs tools, guidance, and scalable programs to deliver customized, real-time cybersecurity.

Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs

Arctic Wolf’s 2025 outlook shows MSP opportunities as insurers tackle ransomware threats and emerging AI risks through expanded security partnerships.

Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA

MetTel secures a $54M contract to modernize 15,000 VA phone lines across 1,875 locations using its POTS Transformation solution, enhancing reliability and performance.

Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.