Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Survey Indicates More Businesses Are Heavily Investing in Cybersecurity

Survey Indicates More Businesses Are Heavily Investing in Cybersecurity

A survey from Splunk and Enterprise Strategy Group indicates that organizations tend to invest a significant amount of their capital into cybersecurity. Even more interesting is that 88 percent of respondents in this survey reported that they would increase these investments, with 35 percent reporting that they will be substantial. What other insights can we glean from this survey?

Of particular note is how nasty and commonplace some of these cyberattacks can get.

How Common are Cyberattacks?

The data provided by this survey indicates that just over half of the surveyed respondents found an increase in cyberattacks, with 53 percent of them confirming that there was an increase in attacks during the pandemic. Zooming out a bit, 84 percent of these respondents found that they experienced a significant cybersecurity incident within the past two years.

These attacks broke down as follows:

  • Email compromise attacks (42 percent)
  • Data breaches (39 percent)
  • Mobile malware (37 percent)
  • DDoS attacks (36 percent)
  • Phishing (33 percent)
  • Ransomware (31 percent)
  • Compliance and regulation violations (28 percent)

Costs Associated with These Cyberattacks

These attacks have had a plethora of consequences and costs for businesses that suffer from them. Here are some of them:

  • 40 percent of surveyed businesses stated that the cost of the time spent by IT to resolve the impacts of security incidents was the largest expense that these incidents caused.
  • 36 percent cited lost productivity as their primary cost.
  • 35 percent blamed system and application disruption.
  • 32 percent prioritized the disruption that their business processes experienced.
  • 28 percent were most concerned about breaches of confidential data (with 19 percent concerned about disclosing these breaches).
  • 18 percent stressed about their employees being prosecuted or terminated.

It’s also important to consider that security leaders and professionals have both reported that their jobs have become harder (49 percent). These leaders and professionals have cited the shifting landscape of threats (48 percent), transitioning to the cloud and those challenges (32 percent), and workplace hiring (28 percent) as some of the ways in which their jobs have been made more difficult.

It also does not help that the adoption of cloud-based solutions was so rushed by the COVID-19 pandemic that it has led to shortcomings and challenges regarding cloud usage.

How Does Your Cloud Usage Shape Up?

More threats are being utilized against businesses through the cloud, so it’s of critical importance that you are able to secure it. Voyage Technology can help your business achieve all that it needs regarding security and the cloud. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 29 April 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud Hardware IT Support Internet User Tips Malware Email Phishing Efficiency Google Workplace Tips Computer Privacy Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Microsoft Data Backup Communication Small Business Mobile Device Smartphones Workplace Strategy Smartphone Business Management Mobile Devices communications Android Saving Money VoIP Managed IT Services Data Recovery Microsoft Office Managed Service Browser Social Media Passwords Upgrade Disaster Recovery Network Backup Internet of Things Tech Term Automation Artificial Intelligence Cloud Computing Covid-19 Remote Server Managed Service Provider Remote Work Facebook Miscellaneous Windows Outsourced IT Gadgets Encryption Spam Holiday Windows 10 Information Employee/Employer Relationship Business Continuity Government Data Management Current Events Productivity Wi-Fi Blockchain Business Technology Windows 10 Virtualization Data Security Apps Compliance Two-factor Authentication Bandwidth Apple Networking Managed Services App Voice over Internet Protocol Employer-Employee Relationship Office Mobile Device Management Vendor Chrome Gmail Budget How To Conferencing BDR Computing Hacker Information Technology Avoiding Downtime Mobile Office Access Control Office 365 Applications Storage Password Help Desk WiFi Bring Your Own Device Managed IT Services Big Data Healthcare Operating System BYOD Computers Risk Management Virtual Private Network Training Website AI Marketing Health HIPAA Analytics Router Office Tips Augmented Reality Retail Windows 11 Monitoring The Internet of Things Scam Data loss Excel Social Remote Workers Going Green Patch Management Telephone Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Cooperation Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions IT Support Tip of the week Firewall Document Management Safety Maintenance Holidays Antivirus Sports Data Storage 2FA Mouse Smart Technology Supply Chain Video Conferencing Administration Managed Services Provider Saving Time Virtual Machines Professional Services Managed IT Service Robot Customer Relationship Management Downloads iPhone Settings Licensing Wireless Printing Content Filtering Vulnerabilities Entertainment Hacking IT Management YouTube Meetings Data Privacy Presentation VPN Images 101 Cryptocurrency Wireless Technology Telephone System Multi-Factor Authentication Computer Repair Mobility Cost Management Virtual Desktop Data storage LiFi Word Outlook Employees Integration Machine Learning Money Humor User Tip Modem Mobile Security Processor Proxy Server Reviews Deep Learning Cookies Twitter Cyber Monday Medical IT Hotspot Transportation Small Businesses Undo Tactics Development Error Education Mirgation Hypervisor Displays Social Engineering Shopping Nanotechnology Optimization Remote Computing PowerPoint Language Employer/Employee Relationships Outsourcing Mobile Computing Addiction Management PCI DSS Tablet Chatbots Search Navigation Gig Economy Application Best Practice Screen Reader Alert Distributed Denial of Service Workplace Buisness File Sharing Computing Infrastructure Teamwork Hiring/Firing Dark Data Managed IT Service Level Agreement Internet Service Provider IBM Legal Regulations Compliance IT solutions Identity How To Evernote Paperless Bookmark Business Growth Smart Tech Memes Notifications Co-managed IT Download Net Neutrality Travel Alerts SQL Server Technology Care Techology Financial Data Google Maps History Cortana Business Communications Break Fix Scams Browsers Smartwatch Alt Codes Connectivity IT Upload Procurement Downtime Unified Threat Management Azure Hybrid Work Competition Unified Threat Management Social Network Telework Hosted Solution Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Typing IoT Communitications Trends Supply Chain Management Network Congestion Google Drive User Error Customer Resource management FinTech User Regulations Knowledge Physical Security Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Gamification Flexibility Point of Sale Staff Value Business Intelligence 5G IP Address Google Docs Organization Unified Communications Social Networking Experience Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras Bitcoin Network Management Smart Devices Running Cable Tech Support Content Remote Working Wearable Technology Memory Vendors Monitors Google Wallet Health IT Recovery Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Directions Videos Hard Drives Windows 8 Assessment Electronic Health Records Laptop Websites Wasting Time Threats Domains Drones SharePoint Trend Micro Electronic Medical Records Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Refrigeration Internet Exlporer Software as a Service Halloween Username Managing Costs Amazon Writing Public Speaking Lenovo Lithium-ion battery eCommerce Virtual Reality Black Friday SSID Virtual Assistant Outsource IT Hacks Server Management Database Surveillance Entrepreneur Scary Stories Private Cloud Identity Theft IT Technicians Virtual Machine Environment Fun Media Superfish

Blog Archive