According to the Cyber Insecurity: Managing Threats From Within study which researched among 300 C-level specialists located in North America, Europe, and Asia-Pacific, human factor is pinpointed as the main reason for a breach.
91% of respondents claim that security measures are not sufficient and should be reconsidered in their companies.
85% are convinced that human errors, social engineering and employee malicious activity inflict major damage.
82% insist on involving as much concern from executive board as possible to manage risks regarding human behaviour.
86% of executives had to deal with at least one data breach in the past three years.
47% are sure that their organisations will have to confront a serious data leak in the next three years.
33% of respondents state that the most likely way information breach influences their business is loss of revenue, 30% think it is loss of clients, and other 30% point at the necessity to dismiss employees who became part of a situation which caused a breach.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!