Two-thirds think their business will be hit by a data breach

Okta's research explained out of date systems were to blame

Research has revealed that almost two-thirds of businesses think their systems will be hit by a data breach if their technology is not updated in the next 12 months.

Okta's Secure Business Agility report asked 300 IT and security professionals about their company's policies around security and IT.

More than half of those asked said their current security solutions compromise productivity, although 48% explained the security measures their company does have in place allow them to adopt the best solutions on the market in order to boost productivity.

Lack of visibility across the organisation was the main sticking point for IT and security professionals, while 85% said cloud and mobile solutions were causing problems. 80% of respondents said employees being irresponsible when it comes to passwords as their main issue.

Advertisement
Advertisement - Article continues below

"In order to be more productive, organisations worldwide are investing in cloud and mobile technologies, enabling their staff to work from virtually anywhere," said David Baker, Chief Security Officer at Okta. "But this isn't enough to ensure true agility. As organisations become increasingly connected, the traditional idea of the enterprise network boundary is vanishing and businesses need to prioritise strong security."

Almost all respondents (92%) said they think their company could do more to integrate and support cloud applications and Okta said this reveals a big opportunity for organisations to be more agile and increase productivity in their company.

"To successfully navigate the new perimeter and avoid compromising on security and productivity, IT leaders need to adopt tools that span traditional company and network boundaries and enable agility across the organisation."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/business/business-strategy/354195/where-modernisation-and-sustainability-meet-a-tale-of-two
Sponsored

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019