TelecomTV TelecomTV
  • News
  • Videos
  • Channels
  • Events
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • Open RAN
  • Digital Platforms and Services
  • 5G
  • Access Evolution
  • Private Networks
  • Cloud Native
  • Edge
  • Open Networking
  • Sustainability
  • AI, Analytics and Automation
  • 6G Research and Innovation
  • Security
  • More Topics
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • |
  • About
  • Contact
  • |
  • Connect with us
  • 5G
  • 6G Research and Innovation
  • Access Evolution
  • AI, Analytics and Automation
  • Cloud Native
  • Digital Platforms and Services
  • Edge
  • Open Networking
  • Open RAN
  • Private Networks
  • Security
  • Sustainability
  • Connect with TelecomTV
  • About
  • Privacy
  • Help
  • Contact
  • Sign In Register Subscribe
    • Subscribe
    • Sign In
    • Register
  • Search

Industry Announcements

Tracker

Accenture Survey: One in three cyberattacks result in a security breach, yet most organizations remain confident in their ability to protect themselves

Via Accenture Newsroom

Nov 2, 2016

Survey indicates overconfidence may be putting organizations at higher risk for attacks

NEW YORK; Nov. 2, 2016 – A new security survey from Accenture (NYSE: ACN) finds that in the past twelve months, roughly one in three targeted attacks resulted in an actual security breach, which equates to two to three effective attacks per month for the average company. Still, a majority of security executives ( 75 percent ) surveyed are confident in their ability to protect their enterprises from cyberattacks.

In the report titled “Building Confidence: Facing the Cybersecurity Conundrum," Accenture surveyed 2,000 enterprise security practitioners representing companies with annual revenues of $1 billion or more in 15 countries about their perceptions of cyber risks, the effectiveness of current security efforts and the adequacy of existing investments. The survey reveals that the length of time taken to detect these security breaches often compounds the problem, as more than half of executives ( 51 percent ) disclose that it takes months to detect sophisticated breaches, and as many as a third of all successful breaches are not discovered at all by the security team.

“Cyberattacks are a constant operational reality across every industry today and our survey reveals that catching criminal behavior requires more than the best practices and perspectives of the past. There needs to be a fundamentally different approach to security protection starting with identifying and prioritizing key company assets across the entire value chain,” said Kevin Richards, managing director, Accenture Security, North America. “It is also clear that the need for organizations to take a comprehensive end-to-end approach to digital security – one that integrates cyber defense deeply into the enterprise – has never been greater.”

What has Been Done in the Past is not Working

Out with the old and in with the new is easier said than done, especially when it comes to embracing new technologies or cyber defense tools.

  • While survey respondents say internal breaches have the greatest impact, 58 percent prioritize heightened capabilities in perimeter-based controls instead of pivoting to address high-impact internal threats.
  • Research findings further show that most companies do not have effective technology in place to monitor for cyberattacks and are focused on risks and outcomes that have not kept pace with the threat.
  • Only slightly more than one-third ( 37percent ) of respondents say they are confident in their ability to perform the essential activity of monitoring for breaches and only a similar number ( 36 percent ) say the same about minimizing disruptions.

Getting Smarter about Security Spending

Recent high-profile cyberattacks have driven significant increases in cybersecurity awareness and spending. Yet, the sentiment among those surveyed suggests organizations will continue to pursue the same countermeasures instead of investing in new and different security controls to mitigate threats.

  • For example, given extra budget, 44 percent to 54 percent of respondents would “double down” on their current cybersecurity spending priorities – even though those investments have not significantly deterred regular and ongoing breaches.
  • These priorities include protecting the company’s reputation ( 54 percent ), safeguarding company information ( 47 percent ), and protecting customer data ( 44 percent ).
  • Far fewer companies would invest the extra funds in efforts that would directly affect their bottom line, such as mitigating against financial losses ( 28 percent ) or investing in cybersecurity training ( 17 percent ). Key country highlights from the report include:

  • Overall, it takes longer to spot a breach in the US and the UK with over a quarter of organizations taking a year or more to detect a successful attack. ( 30 percent in the US; 26 percent in the UK).

  • Organizations in France, Australia and the US are the least confident in their ability to monitor for a breach compared to the global average.
  • Organizations in Germany ( 52 percent ) and the UK ( 50 percent ) are the most confident in monitoring for breaches compared to the global average ( 38 percent ).
  • Organizations in France spend the most ( 9.4 percent ) of their total IT budget on cybersecurity compared to the global average of 8.2 percent.
  • Organizations in Australia and the US spend the lowest amount on cybersecurity, as a percent of their total IT budget. ( 8 percent in the US; 7.6 percent in Australia). For more information on steps organizations can take to effectively deal with cyber threats, visit: www.accenture.com/cybersecurityreport.

Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Providing next-generation services that span the entire security lifecycle and protect value chains end-to-end – including strategy and risk management, cyber defense, digital identity, application security and managed security services – Accenture helps businesses around the world defend against known sophisticated threats, and the unknown.

Related Topics
  • Accenture,
  • Enterprise,
  • News,
  • North America,
  • Research and Trials,
  • Security,
  • Tracker

More Like This

Access Evolution

400 Gbit/s to drive service provider router growth, enabling telco and cloud expansion, according to Dell’Oro Group

Aug 17, 2022

5G

Airtel pays Rs 8312.4 Cr for 5G spectrum to DOT; Instalment for 4 years settled ahead of schedule with a view to free up cash flows for 5G roll out

Aug 17, 2022

Access Evolution

Aviat extends routing to the network edge

Aug 17, 2022

6G R&I

5GAA and 6G-IA sign a Memorandum of Understanding

Aug 17, 2022

Access Evolution

Lumentum Announces Fiscal Fourth Quarter and Full Year 2022 Results

Aug 17, 2022

This content extract was originally sourced from an external website (Accenture Newsroom) and is the copyright of the external website owner. TelecomTV is not responsible for the content of external websites. Legal Notices

Email Newsletters

Stay up to date with the latest industry developments: sign up to receive TelecomTV's top news and videos plus exclusive subscriber-only content direct to your inbox – including our daily news briefing and weekly wrap.

Subscribe

Top Picks

Highlights of our content from across TelecomTV today

0:46

The Cloud Native Telco Summit returns this September!

8:32

Azita Arvani on Being a Female Leader at Rakuten Symphony

16:19

AT&T Amy Zwarico on securing telco applications in the public cloud

1:44

Join us for the greatest industry debate of the year!

TelecomTV
Company
  • About Us
  • Media Kit
  • Contact Us
Our Brands
  • DSP Leaders World Forum
  • Great Telco Debate
  • TelecomTV Events
Get In Touch
[email protected]
+44 (0) 207 448 1070
Connect With Us
  • Privacy
  • Cookies
  • Terms of Use
  • Legal Notices
  • Help

TelecomTV is produced by the team at Decisive Media.

© Decisive Media Limited 2022. All rights reserved. All brands and products are the trademarks of their respective holder(s).