Hornetsecurity IT Security Compliance Survey

			<div>
			<div>
			
			
			
			
			<div>
			
			
			
			
			<div><h2>1 in 4 companies reported IT security incidents in the last year, survey finds</h2>

27.6% of organizations were the target of known IT incidents in the last 12 months

			<img alt="IT Security Compliance" height="800" src="https://www.hornetsecurity.com/wp-content/uploads/2022/06/IT-Security-Compliance-01.jpg" title="IT Security Compliance" width="1200" />
		</div><div>
			
			
			
			
			<div><p>A global survey of IT professionals and leaders of over 800 organizations reveals that more then a quarter of organizations surveyed has reported being the target of a security-related incident in the last 12 months. Of these organizations that have been targeted, 71.3% are subject to security compliance requirements such as HIPAA, PCI, SOX, GDPR, and ITAR/CMMC. The survey focuses on IT security measures within organizations, along with how these measures relate to the compliance requirements created by governing bodies.</p>

While no strict causality exists between the rate of incidents and the presence of compliance requirements, one can conclude that organizations that operate in industries or territories with a higher incidence of cyber-attacks are more likely to be regulated by compliance requirements.

In fact, the survey found that 3 in 10 organizations (30.4%) that are required to conform to compliance requirements have reported being the target of an IT security-related incident in the last year, in comparison to 22.8% of those not required to follow compliance regulations.

The high incidence of IT security-related incidents among organizations that are subject to regulatory requirements may also explain why 70.5% of organizations find it necessary to invest in IT security beyond what is mandated by compliance standards.

		</div><div>
			<div>
			
			
			
			
			<div>
			
			
			
			
			<div><h3>Attacks via email account for 71% of all reported incidents </h3></div>
		</div><div>
			
			
			
			
			<img alt="IT Security Compliance" height="1320" src="https://www.hornetsecurity.com/wp-content/uploads/2022/06/IT-Security-Compliance-02.jpg" title="IT Security Compliance" width="1200" />
		</div><div>
			
			
			
			
			<div><p>As shown in the chart above, email spam campaigns, phishing/credential theft, and email fraud are the most commonly reported known vectors of attack. This set of data reinforces our knowledge of the fact that the most common weakness among organizations is where it is easiest to communicate with end-users – email.</p>

While compromised endpoints, zero-day threats, supply chain attacks, and insider threats were also mentioned as vectors of attack during these incidents, email remains the most attractive prospect for would-be cybercriminals.

While stock email filtering and security features offered by cloud workspace providers such as Microsoft 365 can help combat these threats, more advanced email security features offered by third party security providers can relieve pressure from internal IT departments, allowing them to focus on other business priorities.

		</div>
			
			
		</div><p>Der Beitrag <a href="https://www.hornetsecurity.com/en/security-information/hornetsecurity-it-security-compliance-survey/" rel="noreferrer" target="_blank">Hornetsecurity IT Security Compliance Survey</a> erschien zuerst auf <a href="https://www.hornetsecurity.com/en/" rel="noreferrer" target="_blank">Hornetsecurity</a>.</p>

Article Link: Hornetsecurity IT Security Compliance Survey - Hornetsecurity