Companies up spending on cybersecurity

As more companies adopt cloud and new technologies, they also focus more on security, according to survey

Enterprises are spending more on hiring cyber-security staff and employing security-relevant tools, according to this year's PwC Global State of Information Security survey (GSISS)

More organisations are now adopting cloud services to store and manage their data, and extra security measures are being employed to prevent the breach of sensitive information, the study found.

Responses to the PwC survey suggested some of the fields making greater use of cloud services are IT (63%), finance (32%), marketing and sales (34%), customer service (34%) and operations (35%).

The GSISS survey collected the responses of over 10,000 CEOs, SFOs, CIOs, CISOs, SCOs, VPs and directors of IT/security practices from 127 different countries.

Out of all the study respondents, 59% said they are increasing their spending on cyber-security due to their companies' higher employment of digital technologies.

Overall, 62% of respondents said they currently use managed security services to ensure their company's data is safe from cyber-attacks.

"We are seeing more of what we once saw as a risk, being turned into possible solutions," said David Burg, PwC's global and US advisory cybersecurity leader. "For example, many organisations are embracing advanced authentication as a cloud service in place of solely password based authentication."

Some of the security measure respondents reported using include biometrics for authentication (57%), big data analytics (51%), and developing security strategies for the Internet of Things (46%).

Burg added that there is no one-size-fits-all model for effective cybersecurity.

"It's a journey toward a future state that starts with the right mix of technologies, processes, and people skills. With those components in place, cybersecurity potentially serve as an indispensable ongoing business enabler," he said.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

3 Mar 2021
Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021