Cyber Security Research Surveys

What’s really going on inside today’s IT shops? We conduct frequent, anonymous cyber security research surveys to find out.

From privileged access management to zero day attacks, insider threats to IT outsourcing – here’s a look at some of the behind the scenes trends in cyber security, as told to us by those in the know.

Data Breaches and Cyber Attacks

  • 89% of respondents think that huge financial hacks are happening more often than reported and right under the nose of security auditors.
  • 76% believe that cyber attacks are evolving too fast to keep up with.
  • 71% believe that an APT will attempt to breach their organization in the next six months.
  • 48% do not think their IT staff can detect the presence of an attacker who attempts to breach the network or extract private data.
  • 45% do not think they are prepared to defend against a cyber attack, despite all of the IT security their organization deploys.
  • 20% are not confident that perimeter security tools react quickly enough to stop APTs.

Learn more in the reports Measuring Current Cyber Security Trends and Outlooks and RSA Conference 2016 Cyber Security Survey.

Cyber Warfare

  • 59% of respondents think a state-sponsored attacker will attempt to breach their organization in the next six months.
  • 58% are not confident that their network has never been breached by a foreign nation state attack or an advanced persistent threat.

Learn more in the report Defending Against State-Sponsored Attacks and Other Advanced Persistent Threats.

Insider Threats

  • 68% of respondents believe that as an IT professional they have more access to sensitive data than people in other departments.
  • 39% can get unauthorized access to their organization’s most sensitive information – including the CEO’s data.
  • 34% have used their privileged access to snoop around the network.
  • 20% have already exploited their privileged access.
  • 13% can access previous employers’ systems using their old credentials.
  • 11% would use their access to sensitive data if they were laid off.

Learn more in the report Survey of IT Security Professionals.

IT Operations

  • 81% of respondents think that staff tend to ignore the rules that IT departments put in place.
  • 76% think that employees in their organization have access to information that they don’t necessarily need to perform their jobs.
  • 69% do not think they are using IT security products to their full potential.
  • 64% suspect that their IT outsourcers made up work to earn extra money.
  • 32% work in organizations that do not have a policy to change default passwords when deploying new hardware, applications and network appliances.
  • 15% say if they left their organization they could still access their admin credentials remotely.

Learn more in the reports Measuring Current Cyber Security Trends and Outlooks and RSA Conference 2016 Cyber Security Survey.