Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Survey Indicates More Businesses Are Heavily Investing in Cybersecurity

Survey Indicates More Businesses Are Heavily Investing in Cybersecurity

A survey from Splunk and Enterprise Strategy Group indicates that organizations tend to invest a significant amount of their capital into cybersecurity. Even more interesting is that 88 percent of respondents in this survey reported that they would increase these investments, with 35 percent reporting that they will be substantial. What other insights can we glean from this survey?

Of particular note is how nasty and commonplace some of these cyberattacks can get.

How Common are Cyberattacks?

The data provided by this survey indicates that just over half of the surveyed respondents found an increase in cyberattacks, with 53 percent of them confirming that there was an increase in attacks during the pandemic. Zooming out a bit, 84 percent of these respondents found that they experienced a significant cybersecurity incident within the past two years.

These attacks broke down as follows:

  • Email compromise attacks (42 percent)
  • Data breaches (39 percent)
  • Mobile malware (37 percent)
  • DDoS attacks (36 percent)
  • Phishing (33 percent)
  • Ransomware (31 percent)
  • Compliance and regulation violations (28 percent)

Costs Associated with These Cyberattacks

These attacks have had a plethora of consequences and costs for businesses that suffer from them. Here are some of them:

  • 40 percent of surveyed businesses stated that the cost of the time spent by IT to resolve the impacts of security incidents was the largest expense that these incidents caused.
  • 36 percent cited lost productivity as their primary cost.
  • 35 percent blamed system and application disruption.
  • 32 percent prioritized the disruption that their business processes experienced.
  • 28 percent were most concerned about breaches of confidential data (with 19 percent concerned about disclosing these breaches).
  • 18 percent stressed about their employees being prosecuted or terminated.

It’s also important to consider that security leaders and professionals have both reported that their jobs have become harder (49 percent). These leaders and professionals have cited the shifting landscape of threats (48 percent), transitioning to the cloud and those challenges (32 percent), and workplace hiring (28 percent) as some of the ways in which their jobs have been made more difficult.

It also does not help that the adoption of cloud-based solutions was so rushed by the COVID-19 pandemic that it has led to shortcomings and challenges regarding cloud usage.

How Does Your Cloud Usage Shape Up?

More threats are being utilized against businesses through the cloud, so it’s of critical importance that you are able to secure it. Voyage Technology can help your business achieve all that it needs regarding security and the cloud. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Mobile Device Ransomware Quick Tips Small Business Workplace Strategy Cybersecurity Microsoft Communication Passwords Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Browser Data Recovery Managed Service Managed IT Services Social Media Microsoft Office Windows Tech Term Remote Network Internet of Things Automation Artificial Intelligence Facebook Current Events Productivity Covid-19 Cloud Computing Managed Service Provider Miscellaneous Gadgets Remote Work Server Outsourced IT Information Holiday AI Encryption Spam Employee/Employer Relationship Windows 10 Compliance Data Management Business Continuity Government Office Training Business Technology Windows 10 Bandwidth Blockchain Virtualization Wi-Fi Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Budget Apple Networking Vendor App Employer-Employee Relationship Managed Services Voice over Internet Protocol Office 365 Tip of the week WiFi How To BDR Applications BYOD Computing Hacker Information Technology Avoiding Downtime Conferencing Marketing Access Control Healthcare Office Tips Analytics IT Support Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services HIPAA Router Operating System Computers Help Desk Virtual Private Network Risk Management Website Health Telephone Firewall Document Management Cooperation Free Resource Project Management Windows 7 The Internet of Things Scam Microsoft 365 Data loss Social Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 Customer Service Cybercrime Monitoring 2FA Display Excel Printer Paperless Office Remote Workers Infrastructure Word Downloads iPhone Outlook Machine Learning Licensing Money Vulnerabilities Humor Entertainment Data Privacy Safety Images 101 Maintenance Antivirus Sports Mouse Telephone System Multi-Factor Authentication Mobility Cost Management Administration Employees Integration Robot Customer Relationship Management User Tip Modem Settings Mobile Security Processor Printing Wireless Content Filtering Holidays Hacking IT Management Presentation VPN Data Storage YouTube Meetings Physical Security Smart Technology Supply Chain Cryptocurrency Video Conferencing Wireless Technology Managed Services Provider Computer Repair Professional Services Saving Time Virtual Machines Virtual Desktop Managed IT Service Data storage LiFi Hard Drives Windows 8 Download Net Neutrality Laptop Websites Alerts SQL Server Technology Care Domains Drones Financial Data History Business Communications Electronic Medical Records Break Fix Scams SharePoint Browsers Smartwatch Connectivity IT Refrigeration Upload Procurement Halloween Azure Hybrid Work Public Speaking Lenovo Social Network Telework Cyber security Writing Multi-Factor Security Tech Human Resources Virtual Reality Dark Web Cables Lithium-ion battery CES IoT Communitications Hacks Server Management Trends Supply Chain Management Entrepreneur Scary Stories Private Cloud Superfish Customer Resource management FinTech Identity Theft Regulations Fun Google Calendar Term Google Apps Twitter Microsoft Excel IT Maintenance Data Analysis Deep Learning Star Wars IT Assessment Undo Gamification Flexibility Error Staff Value Business Intelligence Organization Education Social Networking Social Engineering Legislation Shortcuts Remote Computing Ransmoware Fileless Malware Digital Security Cameras Smart Devices Mobile Computing Content Remote Working Wearable Technology Memory Vendors Health IT Tablet Motherboard Data Breach Search Comparison Google Play Be Proactive Alert Permissions Workforce Directions Videos Application Best Practice Assessment Electronic Health Records Managed IT Buisness File Sharing Wasting Time Threats Dark Data IBM Legal IT solutions Trend Micro How To Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Notifications Fraud Meta Microchip Business Growth Username Travel Managing Costs Amazon Black Friday SSID Techology Google Maps eCommerce Cortana Alt Codes Database Surveillance Virtual Assistant Outsource IT Competition Downtime Unified Threat Management IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Unified Threat Management Proxy Server Reviews Hosted Solution Cookies Typing Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Network Congestion Knowledge PowerPoint Google Drive User Error Shopping User Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Management PCI DSS Point of Sale Chatbots 5G Navigation Experience Distributed Denial of Service Workplace IP Address Google Docs Gig Economy Unified Communications Screen Reader Bitcoin Network Management Service Level Agreement Internet Service Provider Running Cable Tech Support Computing Infrastructure Teamwork Hiring/Firing Google Wallet Regulations Compliance Identity Monitors Evernote Paperless Co-managed IT Bookmark Recovery Smart Tech Memes

Blog Archive