No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home GRC Vendor News

Syncsort Survey Finds Disconnect Between Confidence in IT Security Programs and Data Breaches

by Corporate Compliance Insights
January 10, 2019
in GRC Vendor News
red breach sign on computer chip

Despite an optimistic security outlook, 61 percent of organizations report they have either experienced a security breach or aren’t sure

Pearl River, NY (January 10, 2019) – Syncsort, the global leader in Big Iron to Big Data software, today announced results from a survey exploring companies’ top IT security investments and challenges. The survey revealed a sizable gap between confidence in security programs and their effectiveness.

The survey of over 300 respondents found that while 85 percent of respondents are either very or somewhat confident in their organization’s security program, 41 percent said their company had experienced a security breach and 20 percent more were unsure.

The survey also uncovered several challenges and liabilities in security practices that contradict their high levels of confidence.

IT Infrastructure Knowledge and Security Investments Reveal Vulnerabilities Around Newer Data Sources

  • Respondents had firsthand knowledge of security for Windows servers (69 percent), followed by network infrastructure (54 percent).
  • In contrast, only seven percent were familiar with newer, but widely-adopted data storage options like Hadoop data lakes.

Cloud and Compliance Are Security Challenges

  • Twenty-eight percent of respondents named adoption of cloud services as their top security-related challenge, followed by growing complexity of regulations (20 percent) and insufficient IT security staffing (19 percent).
  • The regulation most respondents had to adhere to was GDPR (37 percent), followed by HIPAA and SOX (32 percent each).
  • Security (42 percent) and cloud computing (35 percent) are organizations’ top two IT priorities in the coming year.

Most Organizations Only Perform Security Audits Annually

  • Thirty-two percent of responding organizations only perform security audits annually, while 23 percent do so every three months and 19 percent every six months.
  • The most popular areas examined in audits include application security (72 percent), backup/disaster recovery processes (70 percent), network security (69 percent), antivirus programs and password policies (67 percent each).

Organizations Are Investing in Security, but Mostly Around Basic Measures

  • Almost half of respondents (46 percent) reported increased spending on security-related technology over the past three years. Thirty-five percent (each) developed or significantly updated a security program and increased spending to support cybersecurity initiatives.
  • The top three security investments include network firewall (69 percent), virus protection (66 percent) and malware protection (65 percent), while investments in newer approaches like data tokenization (18 percent) are starting to emerge.
  • In the coming year, 39 percent plan to invest in internal staffing and skills, while 23 percent plan to invest in intrusion prevention and 21 percent in patch management.

Data Breaches Are Common, and Most Organizations Don’t Meet Breach Response Metrics

  • Forty-one percent of organizations have experienced data breaches, while 39 percent have not, and 20 percent say they don’t know.
  • The most common type of breaches were virus/malware attacks (76 percent) and phishing (72 percent). Interestingly, virus attacks came from internal sources roughly half the time while phishing usually came from external sources (78 percent).
  • Fifty percent of breaches were identified in less than a day, while 26 percent were identified in less than a week.
  • Mean time to respond was the breach metric most often met (41 percent), followed by mean time to resolve (35 percent).
  • Following a breach, companies’ most common action was to increase training for IT staff (43 percent).

“The good news is most organizations are auditing their security systems,” said Terry Plath, Senior Vice President, Support and Services, Syncsort. “The bad news is more than two-thirds of audits are done by in-house staff – meaning they’re more likely to be biased – and only once per year. This may not be enough to keep up with the newer and more sophisticated approaches malicious hackers are constantly developing. The bottom line is that data security requires increased focus from IT organizations, particularly against the backdrop of increasing compliance regulations and emerging data rights.”

For more information on the study results, register for our webcast, “Taking the Pulse of IT Security for 2019: Results from Syncsort’s Security Survey.”

Methodology

Syncsort polled over 300 respondents, 78 percent of whom have more than 100 employees at their organization. Participants represented a range of industries including government & public safety, education, financial services and healthcare.

About Syncsort

Syncsort is the global leader in Big Iron to Big Data software. We organize data everywhere to keep the world working – the same data that powers machine learning, AI and predictive analytics. We use our decades of experience so that more than 7,000 customers, including 84 of the Fortune 100, can quickly extract value from their critical data anytime, anywhere. Our products provide a simple way to optimize, assure, integrate, and advance data, helping to solve for the present and prepare for the future. Learn more at syncsort.com.


Previous Post

Monitoring Patterns of Behavior to Fight Fraud and Mitigate Risk

Next Post

Communications Compliance: The Takeaway for 2019

Corporate Compliance Insights

Corporate Compliance Insights

Corporate Compliance Insights

Related Posts

corporate self reporting collage concept revised

SFO’s ‘Cast-Iron Guarantee’ on Self-Reporting Comes With Fine Print

by Ben Boorer
July 7, 2025

Promised predictability in corporate resolutions still leaves room for miscalculation

uk serious fraud office logo

A Crossroads for the SFO

by Neil Swift
July 7, 2025

Failure-to-prevent offenses and DPA reforms have armed prosecutors, but securing individual convictions has proven difficult

dod pentagon

CMMC 2.0 Creates New Compliance Calculus for Defense Contractors

by Shrav Mehta
July 3, 2025

Simplified framework still poses significant challenges for smaller defense industrial base participants

Integreon Launch

Integreon Launches AI-Enabled Legal & Regulatory Compliance Services

by Corporate Compliance Insights
July 2, 2025

Integreon has launched AI-enabled legal and regulatory compliance services powered by ContractPodAi's Leah intelligence platform to automate compliance processes and...

Next Post
businessman with speech bubbles illustrating instant message chat

Communications Compliance: The Takeaway for 2019

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights