• Customer Portal
  • Remote Portal
Logo
  • Home
  • Services
    • IT Support and Maintenance
    • IT Hardware and Software
    • Microsoft 365 /Cloud Services
    • Pensieve Cyber Security
    • Wi-Fi
    • Data Protection
    • Hospitality POS
    • Project Management
  • Sectors
    • Hospitality
    • Small & Medium-Sized Enterprises
  • Support
    • Customer Portal
    • Remote Support
  • About
    • Testimonials
    • Work with Us
    • Contact Us
    • Cyber Security
    • ISO Certification
    • Cyber Essentials Certification
    • Environmental Statement
  • News
    • All News
    • Social Media

65% of IT Leaders expect a serious data breach in the next 12 months

  • HOME
  • NEWS
  • 65% of IT Leaders expect a serious data breach in the next 12 months

26th September, 2016

Source: www.eset.co.uk – 1st September. Tierney’s are proud to partner with ESET  – our chosen supplier for protecting our customers’ systems.

Okta, a cloud IT company, recently released its first Secure Business Agility Report. Which discovered that 65% of IT Leaders believe that their business will be hit with a serious breach in the next 12 months.

The key findings shed some interesting light on how organisations view security software, its day-to-day impact on productivity, the potential for breaches and how it can support growth.

52% of respondents believe that security measures reduce productivity, whilst 48% believe quite the opposite that they enable higher productivity.

Despite this 89% saw acquiring the latest and best tech as the best way to support future growth.

The real juicy finding is that 65% of respondents believe that a serious data breach will hit their business within the next 12 months, unless they change and modernise their security solutions.

This may not sound that shocking given the volume of breaches we’ve seen in the past few years but it does highlight the daily struggle of IT departments to keep up with the demands of technology that is in a state of constant evolution. Fully in the knowledge that one slip-up or a failure to keep pace could result in a massive breach, loss of public confidence, or worse.

You can read the full report here.

Mark James, ESET IT Security Specialist, explains that “malware mutates and adapts so quickly these days that it’s extremely difficult for any company to be expected to always be on top of it.

“As long as they take all the relevant measures and ensure they do as much as they can in keeping hardware and software up to date and patched to the latest versions then I believe they are doing all they can.

“The problem these days are that quite often it takes scare tactics to get things moving: explaining worst case scenarios or listing the types of catastrophic events that “could” happen if nothing is done.

“But it’s not all doom and gloom. Keeping your hardware (firmware) and software up-to-date along with practices likeperiodically reviewing your security policies and changing default passwords will go a long way in helping.”

Do you worry about potential breaches of your data? Or at your business? Contact the team at Tierney’s. [email protected]

Tiernys IT
Address
Tierney’s Office Automation Ltd,
23 & 24 NFU Mutual Offices
Camelgate
Spalding
PE12 6ET

E-mail
[email protected]
Phone
UK +44 333 121 0122
USA +1 202 977 2086
Copyright 2025 Terms & Conditions | Privacy Policy | Cookie Policy
Site by acton | web
<

ItemCustomer Portal

ItemFree Site Survey

ItemRemote Connection

Manage Cookie Consent
We use cookies to optimise our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}