- Organizations spend more on cyber security but that doesn’t mean they’re self -assured
- 67% of companies experienced a breach of data security in the last 24 months
- Almost one -third suffered a breach of data as a result
Most companies (67%) have experienced a data violation in the last 24 months, despite an increase in spending, new research from Pendera shows where 24% experience a break in the last 12 months and 43% in the last 12 months.
During these violations, the most common disruption that suffered was not planned downtime, with 36% of the violated organizations affected. Many companies also suffered a data breach (30%) and financial loss (28%) showing how harmful security breaches can be.
Of those who revealed the effects of the violation, a shocking 76% reported an impact on confidentiality, integrity and/or the availability of their data – with only 24% reported no significant influence.
Make self -confidence
Confidence in cyber support for the private sector is low, with only 14% confident in their government’s cyber security support – with 64% of CISOS reporting that the government provides help to protect the private sector, but that is not enough.
US companies spent an average of $ 187,000 annually on penetration tests or ‘pentesting’ that simulated cyberattacks against their own systems to test for vulnerabilities – this amounts to just over 10% of total IT security budgets, but over 50% of CISOS say they will increase this in 2025.
Changes in corporate infrastructure that added users, new configurations and permit updates are done at a much faster speed than security validation, with 96% of US companies reporting that such changes “on at least one quarterly basis are, but only 30% penting stitches at the same frequency,” the report suggests.
“The pace of changes in corporate environments has made traditional testing methods unsustainable,” said Jason Mar-Tang, Field Ciso in Pendera.
“96% of organizations make changes to their IT environment at least quarterly. Without automation and technology-driven validation, it is almost impossible to keep up. The report’s findings strengthen the need for scalable security validation strategies that meet the speed and complexity of today’s environments.”