Previous Page  63 / 84 Next Page
Information
Show Menu
Previous Page 63 / 84 Next Page
Page Background

Bottom line: more connections

and more portals for the bad guys

to target.

An Escalating Threat

Landscape

It’s not like the bad guys don’t

already have plenty of targets: data

breaches, put simply, have become

the norm. In the healthcare vertical

alone, a full 89 percent of organiza-

tions and 60 percent of their third-party

business associates have experienced

data breaches during the past two

years, according to the Ponemon Insti-

tute. And 79 percent of healthcare or-

ganizations experienced multiple data

breaches (two or more) in that time

period – up 20 percent since 2010.

More than one-third, or 34 per-

cent, of healthcare organizations

experienced two to five breaches.

And nearly half of healthcare orga-

nizations, or 45 percent, had more

than five breaches.

Criminal attacks are the leading

cause of data breaches in the verti-

cal, up 5 percent to 50 percent this

year. Medical records are the most

commonly exposed data, followed

by billing and insurance records,

and payment details.

Critically, while the majority of

breaches are small (under 500 re-

cords) and are not reported to the U.S.

Department of Health and Human

Services and the media, the financial

impact is significant. Overall, breaches

in healthcare are costing the industry a

whopping $6.2 billion per year.

Unfortunately, businesses across

the board, from retail to finance

to SMBs and beyond, are facing

similar statistics. And at the heart of

their crisis is the fact that their inter-

nal resources simply can’t keep up

with the risks.

Consider that as few as one in

five (22 percent) of IT leaders be-

lieve their organization is “very well

prepared” to identify and respond to

cyber-attacks, according to research

by Harvey Nash and KPMG. And 12

percent now believe their business

is exposed in multiple areas.

IoT is already exacerbating the

situation. For instance, the number of

organizations connecting wearables

to their networks has nearly doubled

since 2014 – increasing from 13 per-

cent to 24 percent, according to the

research from Spiceworks. As such,

wearables are expected to be the top

source of security breaches among

IoT devices in the near term (53

percent of respondents believe this).

Source: IHS, Inc.

Endpoint Security Spending 2015 vs. 2016

Top Security Projects - Next 12 Months

What are your organization’s top three information security projects over

the next 12 months

Source: 451 Research; 919 IT security professionals

Endpoint Security

Security Information

and Event Management

Security Awareness Initiatives

Vulnerability Assessment

Data Leakage Prevention (DLP)

Identity Management

22%

20%

18%

18%

16%

14%

58%

16%

26%

By what percentage do you expect your organization’s spend

on Endpoint Security will change in 2016 compared to 2015?

Increase

Decrease

Remain the Same

63

July - August 2016

|

CHANNEL

VISION