Blog

Where are Business’ Security Priorities Right Now?

Where are Business’ Security Priorities Right Now?

According to a survey conducted by Splunk and Enterprise Strategy Group, more business leaders intend to funnel funding into their cybersecurity—88 percent of respondents reporting a planned increase into their investments, 35 percent reporting that these boosts will be substantial. Let’s examine a few of the insights that this survey has revealed.

To begin, it’s important to acknowledge how severe and prevalent cyberattacks can be.

How Common are Cyberattacks?

Based on the data returned by this survey, just over half of surveyed respondents saw an increase in cyberattacks, 53 percent confirming that there was an increase in attacks throughout the COVID-19 pandemic. 84 percent of these respondents have seen a significant cybersecurity incident sometime in the past two years.

These attacks broke down as follows:

  • Email compromise attacks (42 percent)
  • Data breaches (39 percent)
  • Mobile malware (37 percent)
  • DDoS attacks (36 percent)
  • Phishing (33 percent)
  • Ransomware (31 percent)
  • Compliance and regulation violations (28 percent)

Costs Associated with These Cyberattacks

Of course, these various attacks can result in an equal variety of consequences and costs to the businesses impacted by them. For instance…

  • 40 percent of surveyed businesses stated that the cost of the time spent by IT to resolve the impacts of security incidents was the largest expense that these incidents caused.
  • 36 percent cited lost productivity as their primary cost.
  • 35 percent blamed system and application disruption.
  • 32 percent prioritized the disruption that their business processes experienced.
  • 28 percent were most concerned about breaches of confidential data (with 19 percent concerned about disclosing these breaches).
  • 18 percent stressed about their employees being prosecuted or terminated.

It also should be said that security leaders and professionals alike have reported their jobs becoming more challenging, 49 percent reporting in the affirmative. Furthermore, they specifically cited a shifting landscape in terms of threats (48 percent), transitioning a business’ workload into the cloud and the challenges that this process brings about (32 percent), and workplace hiring (28 percent).

Furthermore, the rushed adoption that the COVID-19 pandemic encouraged of cloud-based solutions has led to a few shortcomings and challenges related to cloud usage.

Therefore, Businesses Need to Ensure their Cloud Solutions Are Properly Secured

With more threats leveraged against businesses via cloud solutions, it is all the more important that these solutions are properly secured. White Mountain IT Services can help your business accomplish this. To find out how our team can assist you in terms of your security, give us a call at 603-889-0800. 

By accepting you will be accessing a service provided by a third-party external to https://www.whitemtn.com/

Related Posts

Nothing is more frustrating than going to log into your device and finding out that you either cannot access it or that files you thought were there have been wiped. Unfortunately, this is the situation that many users of a specific device have recen...
Cybersecurity is one of those components to an IT strategy that is absolutely critical; you cannot ignore it in today’s age of ransomware and other high-profile hacks. In order to make sure that you are prepared to handle anything that comes your way...
“Hackers are a serious threat to modern businesses” isn’t exactly a novel statement, is it? However, if a hacker was to be lurking on your network, would you know the signs to help you catch them? Just in case, we wanted to share a few strategies tha...
A new ransomware attack has surfaced, this time mostly targeting IT companies and their clients. The attack is specifically targeting the Kaseya platform. Kaseya is management software that many IT companies use to remotely manage and support technol...
Most accounts these days require a password of some sort, and as such, the average user has countless of these codes that need to be kept both secure and top-of-mind. Some web browsers have built-in password management tools to help make them more us...
It doesn’t matter if you are a small locally-owned business or a larger-scale enterprise. Network security is equally important, as all businesses by default collect valuable information for hackers. It makes sense to protect your valuable assets, an...
There are now five bipartisan bills being considered in the United States House of Representatives, strictly intended to help put some checks on the power that today’s modern technology giants have. Let’s consider what these bills are, and why the cu...
It seems that the last few months have been filled with major cyberattacks, particularly those taking advantage of major businesses that might not initially be considered targets for these kinds of acts. For instance, McDonald’s Restaurants was recen...
HIPAA—the Health Insurance Portability and Accountability Act—is a serious concern for all healthcare providers that operate within the United States, and for good reason! Since August 1996, HIPAA has mandated that these healthcare providers comply w...
Your business’ data is perhaps its most crucial resource—which is why it is so important that it remains protected against all threats (including those that come from within your own business). Consider, for a moment, the ongoing trial of Xiaorong Yo...
Millions of people find themselves sitting in front of a computer moving files around and corresponding with people over the phone, through email, or updating info in the company’s line of business app. What many of them don’t know, however, is that,...
Last weekend saw a significant cyberattack waged against the world’s largest meat processor and distributor, JBS S.A., that completely suspended the company’s operations in both North America and Australia… and as a result, has impacted the supply ch...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions