Bottom line: more connections
and more portals for the bad guys
to target.
An Escalating Threat
Landscape
It’s not like the bad guys don’t
already have plenty of targets: data
breaches, put simply, have become
the norm. In the healthcare vertical
alone, a full 89 percent of organiza-
tions and 60 percent of their third-party
business associates have experienced
data breaches during the past two
years, according to the Ponemon Insti-
tute. And 79 percent of healthcare or-
ganizations experienced multiple data
breaches (two or more) in that time
period – up 20 percent since 2010.
More than one-third, or 34 per-
cent, of healthcare organizations
experienced two to five breaches.
And nearly half of healthcare orga-
nizations, or 45 percent, had more
than five breaches.
Criminal attacks are the leading
cause of data breaches in the verti-
cal, up 5 percent to 50 percent this
year. Medical records are the most
commonly exposed data, followed
by billing and insurance records,
and payment details.
Critically, while the majority of
breaches are small (under 500 re-
cords) and are not reported to the U.S.
Department of Health and Human
Services and the media, the financial
impact is significant. Overall, breaches
in healthcare are costing the industry a
whopping $6.2 billion per year.
Unfortunately, businesses across
the board, from retail to finance
to SMBs and beyond, are facing
similar statistics. And at the heart of
their crisis is the fact that their inter-
nal resources simply can’t keep up
with the risks.
Consider that as few as one in
five (22 percent) of IT leaders be-
lieve their organization is “very well
prepared” to identify and respond to
cyber-attacks, according to research
by Harvey Nash and KPMG. And 12
percent now believe their business
is exposed in multiple areas.
IoT is already exacerbating the
situation. For instance, the number of
organizations connecting wearables
to their networks has nearly doubled
since 2014 – increasing from 13 per-
cent to 24 percent, according to the
research from Spiceworks. As such,
wearables are expected to be the top
source of security breaches among
IoT devices in the near term (53
percent of respondents believe this).
Source: IHS, Inc.
Endpoint Security Spending 2015 vs. 2016
Top Security Projects - Next 12 Months
What are your organization’s top three information security projects over
the next 12 months
Source: 451 Research; 919 IT security professionals
Endpoint Security
Security Information
and Event Management
Security Awareness Initiatives
Vulnerability Assessment
Data Leakage Prevention (DLP)
Identity Management
22%
20%
18%
18%
16%
14%
58%
16%
26%
By what percentage do you expect your organization’s spend
on Endpoint Security will change in 2016 compared to 2015?
Increase
Decrease
Remain the Same
63
July - August 2016
|
CHANNEL
VISION