Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Survey Indicates More Businesses Are Heavily Investing in Cybersecurity

Survey Indicates More Businesses Are Heavily Investing in Cybersecurity

A survey from Splunk and Enterprise Strategy Group indicates that organizations tend to invest a significant amount of their capital into cybersecurity. Even more interesting is that 88 percent of respondents in this survey reported that they would increase these investments, with 35 percent reporting that they will be substantial. What other insights can we glean from this survey?

Of particular note is how nasty and commonplace some of these cyberattacks can get.

How Common are Cyberattacks?

The data provided by this survey indicates that just over half of the surveyed respondents found an increase in cyberattacks, with 53 percent of them confirming that there was an increase in attacks during the pandemic. Zooming out a bit, 84 percent of these respondents found that they experienced a significant cybersecurity incident within the past two years.

These attacks broke down as follows:

  • Email compromise attacks (42 percent)
  • Data breaches (39 percent)
  • Mobile malware (37 percent)
  • DDoS attacks (36 percent)
  • Phishing (33 percent)
  • Ransomware (31 percent)
  • Compliance and regulation violations (28 percent)

Costs Associated with These Cyberattacks

These attacks have had a plethora of consequences and costs for businesses that suffer from them. Here are some of them:

  • 40 percent of surveyed businesses stated that the cost of the time spent by IT to resolve the impacts of security incidents was the largest expense that these incidents caused.
  • 36 percent cited lost productivity as their primary cost.
  • 35 percent blamed system and application disruption.
  • 32 percent prioritized the disruption that their business processes experienced.
  • 28 percent were most concerned about breaches of confidential data (with 19 percent concerned about disclosing these breaches).
  • 18 percent stressed about their employees being prosecuted or terminated.

It’s also important to consider that security leaders and professionals have both reported that their jobs have become harder (49 percent). These leaders and professionals have cited the shifting landscape of threats (48 percent), transitioning to the cloud and those challenges (32 percent), and workplace hiring (28 percent) as some of the ways in which their jobs have been made more difficult.

It also does not help that the adoption of cloud-based solutions was so rushed by the COVID-19 pandemic that it has led to shortcomings and challenges regarding cloud usage.

How Does Your Cloud Usage Shape Up?

More threats are being utilized against businesses through the cloud, so it’s of critical importance that you are able to secure it. Voyage Technology can help your business achieve all that it needs regarding security and the cloud. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 13 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Mobile Device Ransomware Microsoft Quick Tips Small Business Passwords Cybersecurity Backup Saving Money Communication Data Backup Smartphone Managed Service Android Productivity VoIP Upgrade Business Management Smartphones Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Remote Tech Term Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Information Holiday Covid-19 Miscellaneous Gadgets Server Managed Service Provider Training Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management IT Support Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps Managed Services Voice over Internet Protocol Apple Networking App BYOD Mobile Device Management Gmail Chrome Budget Employer-Employee Relationship How To Hacker BDR Avoiding Downtime Marketing HIPAA Computing Applications Information Technology Access Control WiFi Office 365 Tip of the week Conferencing Bring Your Own Device Managed IT Services Computers Healthcare Website Operating System Router Virtual Private Network Risk Management Health Help Desk Analytics Office Tips Big Data Augmented Reality 2FA Retail Storage Password Scam Data loss Customer Service Remote Workers Cooperation Going Green Patch Management Save Money Free Resource Remote Monitoring Vulnerability End of Support Project Management Windows 7 Vendor Management Cybercrime Microsoft 365 Physical Security Firewall Display Solutions Printer Paperless Office Infrastructure The Internet of Things Monitoring Windows 11 Social Document Management Telephone Excel Professional Services Mouse Virtual Machines Licensing Hacking Entertainment Administration Presentation iPhone Wireless Technology Telephone System Robot Vulnerabilities Cost Management Settings Data Privacy Printing Wireless Images 101 Content Filtering Word IT Management VPN YouTube Meetings Multi-Factor Authentication Mobility Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Employees Safety Integration Data storage LiFi Smart Technology Outlook Machine Learning Money Saving Time Holidays Humor Data Storage Supply Chain Managed IT Service Video Conferencing Maintenance Antivirus Sports Downloads Managed Services Provider Customer Relationship Management Workplace Browsers Education Connectivity Gig Economy Social Engineering Break Fix Remote Computing Internet Service Provider Teamwork Hiring/Firing Competition Upload Mobile Computing Social Network Regulations Compliance Multi-Factor Security Evernote Paperless Co-managed IT Tablet IoT Search Dark Web Memes Alert Net Neutrality SQL Server Technology Care Best Practice Trends User Managed IT Customer Resource management Buisness File Sharing Regulations Financial Data Dark Data Google Calendar History Business Communications Scams Legal Data Analysis IT solutions Star Wars Smartwatch How To Microsoft Excel IT Notifications Staff Procurement Azure Hybrid Work Business Growth Gamification Travel Social Networking Telework Legislation Cyber security IP Address Tech Human Resources Cables Techology Fileless Malware Google Maps CES Cortana Communitications Wearable Technology Supply Chain Management Alt Codes Content Recovery Health IT Downtime Unified Threat Management Motherboard FinTech Comparison Term Google Apps IT Maintenance Hard Drives Unified Threat Management Directions Hosted Solution Assessment Permissions IT Assessment Flexibility Value Business Intelligence Domains Typing Organization Network Congestion Specifications Shortcuts Ransmoware Refrigeration Google Drive User Error Microchip Internet Exlporer Digital Security Cameras Knowledge Fraud Smart Devices Remote Working Memory Vendors Public Speaking Username Point of Sale 5G Black Friday Data Breach Lithium-ion battery Google Play Be Proactive Workforce Google Docs Entrepreneur Unified Communications Database Videos Experience Electronic Health Records Running Cable Tech Support IT Technicians Wasting Time Threats Bitcoin Network Management Google Wallet Proxy Server Cookies Monitors Cyber Monday Trend Micro Security Cameras Workplace Strategies Meta Undo Tactics Hotspot Software as a Service Laptop Websites Mirgation Managing Costs Amazon Windows 8 Drones Nanotechnology eCommerce SSID Surveillance Virtual Assistant Outsource IT SharePoint Addiction Electronic Medical Records Language Management Halloween Chatbots Virtual Machine Environment Media Medical IT Application Lenovo Screen Reader Reviews Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Development Transportation Small Businesses Service Level Agreement Hacks Server Management Scary Stories Private Cloud Identity Hypervisor Displays IBM PowerPoint Superfish Bookmark Identity Theft Smart Tech Shopping Fun Optimization Twitter Alerts Employer/Employee Relationships Outsourcing Deep Learning Download Error PCI DSS Navigation

Blog Archive