In 2014 Hacking Surge Wake, Survey Shows Network Security Priorities In 2015
By Adam Boone, CMO, Certes Networks
IT departments were battered by a cybersecurity perfect storm in 2014.
While the security community was still roiling in the wake of the Target breach in late 2013, the continuing parade of breaches in 2014 cast a harsh light on inadequate security architectures and poorly implemented security practices.
At the same time, the aggregate costs of data breaches escalated dramatically, as enterprises and payment card issuing institutions faced costs in the billions of dollars in breach response, cleanup, damaged reputations, stolen intellectual property, lawsuits, and lost market valuation. The hacking crisis played out in mainstream media headlines, and top executives lost their jobs in the aftermath of breaches. Now a recent court decision has cleared the way for banks to sue Target over its credit card breach.
In this environment, it’s no surprise that enterprise IT budgeting and project priorities will be shaped by the security tumult of last year.
In November 2014, Certes Networks commissioned Spiceworks to conduct a survey of IT decision-makers to understand their challenges with protecting data traffic and to get a look at their IT security plans for 2015.
The global survey focused on general IT managers, not the security personnel at these enterprises. The 150 respondents at a spectrum of company types and sizes hold responsibilities across the range of IT disciplines, including applications, networking, and end-point management as well as security.
Please log in or register below to read the full article.
Get unlimited access to:
Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.