Endpoint configurations are essential to good security. That’s always been the c...
Surprising Stats & Industry Insights for the Cybersecurity Strategist
In today’s digital battlefield, knowledge is power. As threats evolve rapidly and the costs of security failures continue to rise, businesses must stay informed. The Big CISO Factbook uses facts and figures to highlight the challenges faced by IT and security teams worldwide.
The Factbook combines GYTPOL field insights, original market research, and third-party statistics to paint a data-driven picture of an evolving threat landscape. Ultimately this Factbook is meant to be a resource to help inform decision making and guide strategic planning.
Careening Complexity & Creeping Complacency
It’s no secret that threat actors are constantly refining their tactics, making it increasingly difficult for businesses to defend themselves. With every organization now operating in a digital environment, the attack surface has expanded significantly. As the number of connected devices continues to grow and oversight is challenged by remote work, shadow IT, and configuration drift, the risks multiply and businesses are more likely to face disruption.
But perhaps the biggest issue is complacency. Despite existing in a state of persistent risk, some decision-makers think it acceptable – comforting themselves in the knowledge that their peers are just as vulnerable. They reason that with so many soft targets, they’re relatively safe; at least statistically speaking. So they allow themselves to be indolent.
Of course, in reality – statistically speaking – such an approach is foolish. And this Factbook stands as a powerful rebuttal of such rationalization. The truth is that that type of keeping down with the Joneses attitude results in a race to the bottom that sees everyone lose. It’s not just irresponsible, it’s downright dangerous.
Hardening is seldom easy, but when dealing with technical or design flaws, at least the fix is usually straightforward. When it comes to how technology is deployed however, it’s much more difficult. Existing at the operations level, it’s inherently a function of context. It’s hard to define, mired in human error, and cannot be solved with a patch.
All of which is why vendors generally steer clear of such issues and leave operators to their own devices (literally) – outfitted with little more than their careful attention-to-detail and manual best efforts. As far as methodologies go, it’s far from bulletproof. Case in point: 88% of data breaches are rooted in human error.
It can come from many places, too many to count in fact – from poorly defined processes, a lack of training, or simple overload (too many tasks and too little time), just to name a few. But no matter the source (and without casting any aspersion), you can always count on humans – especially stressed and overworked humans – to occasionally miss things, make mistakes, and exercise questionable judgment. It’s par for the course really. To wit, IDC found that companies with 500-1,499 employees never even investigate 27% of their security alerts.
Cyber fatigue, or the reluctance to take proactive measures due to the overwhelming nature of threats, affects up to 42% of companies. And even when there is a clear will to act, struggles with basic security hygiene compound the challenge and prevent operators from getting out from behind the eight ball.
In this sense, most organizations fail to get out of their own way. And the results are catastrophic:
- Attacks impact 80% of businesses
- 60% of organizations lack confidence in their defensive abilities
- The 2024 financial impact is expected to reach $9.5 trillion
The Transformative Takeaway
Self-Sabotaging Security
The good news, if you can call it that, is that in most organizations the mess is not evenly spread across the enterprise. It’s pretty concentrated in fact – which means there are going to be some low-hanging fruit.
Consider, for example, the facts that:
- 35% of all security incidents stem from misconfigurations
- 73% of organizations have at least one critical security misconfiguration
- Misconfigurations are responsible for 80% of ransomware attacks
- Ransomware breaches now cost an average of $5.13 million (up 330% from 2023!)
- Misconfigurations add up to cost businesses 9% of their revenue, on average.
To make matters worse, there’s a significant talent gap in the cybersecurity industry. With a global shortfall of 3.4 million cybersecurity professionals, businesses must find ways to maximize productivity without compromising their efficacy or security. And allocating 0.52% of their total budgets to cybersecurity, which is the current standard, just isn’t going to cut it.
If nothing else, let The Big CISO Factbook serve as a wakeup call. We need to be more vigilant and we need to rise to the challenge. We can’t afford to bury our heads in the sand.
To survive and thrive in the coming years, organizations will need to take a more proactive approach and invest in automation technologies that enhance hygiene and error-proof configuration security. It might not be easy, but I can promise you that it’ll be worthwhile.
About Author
Eden Aizenkot
A Senior Marketing Manager at GYTPOL, Eden is a dedicated cyber communicator. With a keen eye for strategy, design, and branding, Eden drives growth through impactful campaigns education campaigns.
Subscribe to
our Newsletter
We are ready to help you until and unless you find the right ladder to success.
Related Posts
Join over 25,000 in beating the failure of strategies by following our blog.
The world of cybersecurity is complex and ever-changing. But that doesn't mean t...
5 minute read
For most businesses, IT and security teams go about their work mostly unnoticed....
3 minute read
On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. ...
Comments