Just one-fifth of IT leaders ‘well prepared for cyber attacks’
Published On: June 11, 2018 |
Cyber crime threats have reached an all-time high, yet just around a fifth of the world’s IT leaders are well prepared for a cyber attack.
This is according to the 2018 Harvey Nash/KPMG CIO Survey.
It also found that boards are increasing their investment in data security and privacy as they hurry to become GDPR compliant, as well as to avoid highly damaging data breaches, which have reached an all-time high.
Almost a quarter (23 per cent) more respondents to the survey are prioritising improvements in cyber security than in 2017, while managing operational risk and compliance has also become a significantly increased priority (up 12 per cent).
These two areas represent the fastest growing IT priorities of company boards.
The report found that chief information officers (CIOs) continue to pay significant attention to data trust and privacy threats. In addition, 77 per cent of IT leaders are ‘most concerned’ about the threat of organised cyber crime. This is up from 71 per cent last year. Just over one-fifth (22 per cent) state they are well-prepared for a cyber attack.
Albert Ellis, CEO of the Harvey Nash Group, said: “CIOs have a really difficult tightrope to walk. On one hand the board is asking them to drive innovation, promote transparency and following recent high profile data breaches, ensure the responsible use of customer data throughout the organisation.
“On the other hand, the board is increasing scrutiny and demanding improved reporting on cyber security, data integrity and resilience, as regulators and consumers become much more demanding on personal data.”
He added that the organisations that can achieve the balance between innovation and governance will be in the strongest position to compete.
Share This Post, Choose Your Platform!
With over 20 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.