Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. View our editorial policy here.

Security conscious exec

1 - Making the Case for a Better Cyber Resilience PlanMaking the Case for a Better Cyber Resilience Plan

Managed security service providers can offer intrusion detection, firewalls and virus/spam blocking, and help companies improve their business continuity and cyber resilience plans.

2 - Cyber-Attack Frequency RateCyber-Attack Frequency Rate

66% of respondents report at least one cyber incident in the last 12 months, and
15% had 10-plus incidents during the same period of time.

3 - Root Cause for AttackRoot Cause for Attack

The top sources of cyber disruptions include phishing and social engineering (61%),
malware (45%), spear-phishing attacks (37%), denial of service (24%) and outdated software (21%).

4 - Slow Recovery From Cyber-AttacksSlow Recovery From Cyber-Attacks

Although 31% of organizations report responding to a cyber incident within one hour, it took four hours or more for 19% of organizations.

5 - Security ChampionsSecurity Champions

55% of respondents report a commitment to cyber resilience by top management.

6 - Business Continuity PlanningBusiness Continuity Planning

75% of respondents have business continuity plans related to cyber incidents.

7 - Bad NewsBad News

19% of organizations do not validate their plans for cyber incidents. However, 49% provide outcome reports and action plans, exercises (43%) and awareness raising seminars (41%).

8 - Team WorkTeam Work

42% of recent incidents were discovered by IT personnel, versus 26% that were discovered by virus notification software.

9 - Cost of IncidentsCost of Incidents

73% of respondents report total costs for cyber incidents in the past 12 months of about $55,000 (less than 50,000 euros), but 6% report annual costs of about $550,600  (more than 500,000 euros).

10 - Security ResponseSecurity Response

The most popular cyber resilience methods include using antivirus software and applications (72%), followed by deploying dedicated IT/information security teams (64%), using network monitoring software or applications (63%), aligning to a recognized standard, such as ISO 22301 and ISO 27001 (51%), and deploying a comprehensive business continuity management program (50%).

Subscribe for updates!

You must input a valid work email address.
You must agree to our terms.