eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
1IT Security Improving, but Don’t Press Your Luck on Friday the 13th
2Security Breaches in 2015
3Vulnerability
4Key Factors
Organizations whose security position improved over the past year found success by implementing a handful of vital security technologies and best practices, including the adoption of intrusion detection and prevention systems; improved patch management; implementation of log analysis, such as security information and event management (SIEM) tools; and improved or increased security training for company personnel.
5Security Products and Practices
Endpoint security software topped the list of the most important technologies or practices for ensuring IT security, with 83 percent of respondents identifying it as critical or very important, followed by patch management software (75 percent) and identity and access management tools (71 percent) to round out the top three. In addition, more than half of respondents also identified configuration management software (60 percent) and SIEM software (54 percent) as critical or very important tools.
6Severe Threats Remain
7Sophisticated Attacks
8Breaches in 2016
While approximately one-quarter (24 percent) of respondents said they expect their organizations to suffer from a security breach in 2016, 76 percent of them store customer data, including 46 percent that store customer social security numbers, proving that, for many, the risks and potential damage associated with cyber-attacks are high.