6 out of 10 businesses dealt with a data breach during the past three years.
Nearly 6,000 information security specialists participated in the research which shows that 57% of them are sure that C-level executives are the most likely to disregard security policies.
58% are concerned whether their workplace is prepared for fighting off a global cyberattack.
A third of information security professionals are convinced that their company might be exposed to some running processes launched by an attacker but aren’t aware of it.
Almost half of respondents claim that they suffer stress and fatigue as nearly half of alerts appear to be false alarms.
73% of professionals think that their companies are under-resourced and can’t withstand an external violator. More than a half of specialists were on the verge of quitting their job at their companies for that reason.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!