Companies up spending on cybersecurity

As more companies adopt cloud and new technologies, they also focus more on security, according to survey

Enterprises are spending more on hiring cyber-security staff and employing security-relevant tools, according to this year's PwC Global State of Information Security survey (GSISS)

More organisations are now adopting cloud services to store and manage their data, and extra security measures are being employed to prevent the breach of sensitive information, the study found.

Responses to the PwC survey suggested some of the fields making greater use of cloud services are IT (63%), finance (32%), marketing and sales (34%), customer service (34%) and operations (35%).

The GSISS survey collected the responses of over 10,000 CEOs, SFOs, CIOs, CISOs, SCOs, VPs and directors of IT/security practices from 127 different countries. Out of all the study respondents, 59% said they are increasing their spending on cyber-security due to their companies' higher employment of digital technologies. Overall, 62% of respondents said they currently use managed security services to ensure their company's data is safe from cyber-attacks.

Advertisement
Advertisement - Article continues below

"We are seeing more of what we once saw as a risk, being turned into possible solutions," said David Burg, PwC's global and US advisory cybersecurity leader. "For example, many organisations are embracing advanced authentication as a cloud service in place of solely password based authentication."

Some of the security measure respondents reported using include biometrics for authentication (57%), big data analytics (51%), and developing security strategies for the Internet of Things (46%).

Burg added that there is no one-size-fits-all model for effective cybersecurity.

"It's a journey toward a future state that starts with the right mix of technologies, processes, and people skills. With those components in place, cybersecurity potentially serve as an indispensable ongoing business enabler," he said.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/mobile/mobile-phones/354273/pablo-escobars-brother-launches-budget-foldable-phone
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019