SlideShare a Scribd company logo
WHAT PRICE IT SECURITY?
AT A GLANCE

SECURITY EXPENDITURE

65% say spend on IT security has
increased in last 3 years.

65%

7.77% of IT budget is
dedicated to security

30%

Less than 5% = 30%
5%-10% = 41%
More than 10% = 29%

%

7.77

29%

And this is a common picture across
sector and scale of enterprise

The average increase
in spend is 27%.

41%

27%

AWARENESS OF SECURITY THREATS

Heightened awareness of threat correlates with higher expenditure
Enterprises spending
MORE on IT security than
3 years ago are MORE
concerned about the
threats employees bring:

82%

69%

10%

Enterprises spending MORE
than 10% of their overall IT
budget on security are
MORE concerned than the
lowest spenders (less than
5% of overall budget) about
threats such as:

86%

Employees’ attitude toward
security protocols

Malware
83%

74%

Use of personal cloud storage
such as Dropbox
76%

57%

45%

Use of personally-owned devices
63%

67%

62%

Use of personal cloud storage
such as Dropbox
65%

73%

Malicious external attacks
(not commercially motivated)
63%

45%

Use of mobile devices

57%

Internal threats/attacks

Percentage of spend categories recognising the factor as a threat or major threat

CONFIDENCE IN PROTECTION AGAINST THREATS

Low confidence in protection measures is highest where security
expenditure has increased

58%

of enterprises are
not entirely
confident of the
controls/protection
they have against
ANY security
threat.

More of those that have
increased spend in the last 3
years say that they are entirely
confident in some of their
protection measures than
those whose spend has stayed
the same or declined (48% vs
31%).

The threats most enterprises feel least protected
against are:
1. Employees' attitude toward security protocol (only 2% say they
are entirely confident)
2. Use of personal cloud storage such as Dropbox (10%)
3. Internal threats/attacks (11%)

Survey conducted in March 2013 by Vanson Bourne.
Responses of 100 senior IT decision-makers in UK
commercial enterprises (1000+ employees)

More Related Content

PPTX
New Synopsys research uncovers security's biggest challenges
PPTX
Pharos Security Solution
PDF
Flipping the Script & Changing the Game in Cyber
PDF
To Catch a Phish, or: Why You Must Automate Email Security
PDF
PDF
3 - Interaction between Cyber Security and School IT Policy .pdf
PPTX
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
PPTX
Level3-ATC comSpark.tech Presentation Snapshot
New Synopsys research uncovers security's biggest challenges
Pharos Security Solution
Flipping the Script & Changing the Game in Cyber
To Catch a Phish, or: Why You Must Automate Email Security
3 - Interaction between Cyber Security and School IT Policy .pdf
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Level3-ATC comSpark.tech Presentation Snapshot

What's hot (20)

PDF
MobileSecurityInfographic_v3
PDF
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PPTX
Mobile Security: Perceptions vs Device-harvested Reality
PPT
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
PPTX
Verizon Data Breach Investigations Report (DBIR) 2017
PDF
Infosecurity Europe - Infographic
PPTX
4 Facts Every Business Should Know About Phishing
PDF
Get Connected - Cyber Security Workshop, Prof Tim Watson
PPT
Security Management Trends 2004
PDF
The growing threat to information security: a focus on ISM
PDF
3 Perspectives Around Data Breaches
PPTX
10 Steps to Better Security Incident Detection
PPTX
Automation: Embracing the Future of SecOps
PPTX
STUDY CYBER SECURITY IN AUSTRALIA
PDF
JP Cybersecurity Awareness Cartoons
PPTX
Cyber Security Best Practices
PDF
1whitepaper graphics
PPTX
Ch 3 threats and responses
PPTX
Insights from 2016 Cyberthreat Defense Report
MobileSecurityInfographic_v3
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Mobile Security: Perceptions vs Device-harvested Reality
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
Verizon Data Breach Investigations Report (DBIR) 2017
Infosecurity Europe - Infographic
4 Facts Every Business Should Know About Phishing
Get Connected - Cyber Security Workshop, Prof Tim Watson
Security Management Trends 2004
The growing threat to information security: a focus on ISM
3 Perspectives Around Data Breaches
10 Steps to Better Security Incident Detection
Automation: Embracing the Future of SecOps
STUDY CYBER SECURITY IN AUSTRALIA
JP Cybersecurity Awareness Cartoons
Cyber Security Best Practices
1whitepaper graphics
Ch 3 threats and responses
Insights from 2016 Cyberthreat Defense Report
Ad

Similar to Vanson Bourne Infographic: IT Security (20)

PDF
Think you’re secure? You May Be Surprised
PDF
SVB Cybersecurity Impact on Innovation Report - Overview
PDF
CS Sakerhetsdagen 2015 IBM Feb 19
PPT
Securing Your "Crown Jewels": Do You Have What it Takes?
PDF
Imation infographic us
PDF
Ten Top Tips on Keeping Your Business Secure
PPTX
Valuing Data in the Age of Ransomware
PDF
A 5 step guide to protecting backup data by Iron Mountain
PDF
Ten top tips on keeping your business secure
PPTX
Security Principles for CEOs
PDF
NME IT Security Survey 2016
PPTX
SVB Cybersecurity Impact on Innovation Report
PPTX
Cloud Security By Dr. Anton Ravindran
PDF
Protecting Corporate Information in the Cloud
PPT
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
PDF
R if security_priorities_03.08.22
PPT
The CISO in 2020: Prepare for the Unexpected
PDF
5 Steps to Securing Your Company's Crown Jewels
PDF
The 10 Secret Codes of Security
PDF
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Think you’re secure? You May Be Surprised
SVB Cybersecurity Impact on Innovation Report - Overview
CS Sakerhetsdagen 2015 IBM Feb 19
Securing Your "Crown Jewels": Do You Have What it Takes?
Imation infographic us
Ten Top Tips on Keeping Your Business Secure
Valuing Data in the Age of Ransomware
A 5 step guide to protecting backup data by Iron Mountain
Ten top tips on keeping your business secure
Security Principles for CEOs
NME IT Security Survey 2016
SVB Cybersecurity Impact on Innovation Report
Cloud Security By Dr. Anton Ravindran
Protecting Corporate Information in the Cloud
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
R if security_priorities_03.08.22
The CISO in 2020: Prepare for the Unexpected
5 Steps to Securing Your Company's Crown Jewels
The 10 Secret Codes of Security
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Ad

More from Vanson Bourne (20)

PDF
Vanson Bourne Research Report: Big Data
PDF
Vanson Bourne Infographic: Big Data
PDF
Vanson Bourne Research Report: Wearable Tech
PDF
Vanson Bourne Infographic: Wearable Tech
PDF
Vanson Bourne Key Findings: Wearable Tech
PDF
Vanson Bourne Christmas Percents Infographic
PPTX
Shadow IT 2014: Webcast Slides
PDF
Vanson Bourne Data Summary: Shadow IT - BDMs
PDF
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
PDF
Vanson Bourne Case Study: CA Technologies
PDF
Vanson Bourne Case Study: IBM
PDF
Vanson Bourne Case Study: Progress Software
PDF
Vanson Bourne Case Study: Spreckley Partners
PDF
Vanson Bourne Case Study: Success Factors
PDF
Vanson Bourne Case Study: NTT
PDF
Vanson Bourne Case Study: Porter Novelli
PDF
Vanson Bourne Infographic: Mobile Strategy
PDF
Vanson Bourne White Paper: Market Research
PDF
Vanson Bourne Full Research Report: Directions in Tech Marketing
PDF
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Report: Big Data
Vanson Bourne Infographic: Big Data
Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Key Findings: Wearable Tech
Vanson Bourne Christmas Percents Infographic
Shadow IT 2014: Webcast Slides
Vanson Bourne Data Summary: Shadow IT - BDMs
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne White Paper: Market Research
Vanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Research Insight: Tech Marketing

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Modernising the Digital Integration Hub
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
August Patch Tuesday
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Hybrid model detection and classification of lung cancer
PPTX
Tartificialntelligence_presentation.pptx
Getting started with AI Agents and Multi-Agent Systems
Enhancing emotion recognition model for a student engagement use case through...
Hindi spoken digit analysis for native and non-native speakers
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Modernising the Digital Integration Hub
1. Introduction to Computer Programming.pptx
Group 1 Presentation -Planning and Decision Making .pptx
O2C Customer Invoices to Receipt V15A.pptx
What is a Computer? Input Devices /output devices
August Patch Tuesday
Programs and apps: productivity, graphics, security and other tools
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Web App vs Mobile App What Should You Build First.pdf
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
observCloud-Native Containerability and monitoring.pptx
Developing a website for English-speaking practice to English as a foreign la...
NewMind AI Weekly Chronicles - August'25-Week II
Hybrid model detection and classification of lung cancer
Tartificialntelligence_presentation.pptx

Vanson Bourne Infographic: IT Security

  • 1. WHAT PRICE IT SECURITY? AT A GLANCE SECURITY EXPENDITURE 65% say spend on IT security has increased in last 3 years. 65% 7.77% of IT budget is dedicated to security 30% Less than 5% = 30% 5%-10% = 41% More than 10% = 29% % 7.77 29% And this is a common picture across sector and scale of enterprise The average increase in spend is 27%. 41% 27% AWARENESS OF SECURITY THREATS Heightened awareness of threat correlates with higher expenditure Enterprises spending MORE on IT security than 3 years ago are MORE concerned about the threats employees bring: 82% 69% 10% Enterprises spending MORE than 10% of their overall IT budget on security are MORE concerned than the lowest spenders (less than 5% of overall budget) about threats such as: 86% Employees’ attitude toward security protocols Malware 83% 74% Use of personal cloud storage such as Dropbox 76% 57% 45% Use of personally-owned devices 63% 67% 62% Use of personal cloud storage such as Dropbox 65% 73% Malicious external attacks (not commercially motivated) 63% 45% Use of mobile devices 57% Internal threats/attacks Percentage of spend categories recognising the factor as a threat or major threat CONFIDENCE IN PROTECTION AGAINST THREATS Low confidence in protection measures is highest where security expenditure has increased 58% of enterprises are not entirely confident of the controls/protection they have against ANY security threat. More of those that have increased spend in the last 3 years say that they are entirely confident in some of their protection measures than those whose spend has stayed the same or declined (48% vs 31%). The threats most enterprises feel least protected against are: 1. Employees' attitude toward security protocol (only 2% say they are entirely confident) 2. Use of personal cloud storage such as Dropbox (10%) 3. Internal threats/attacks (11%) Survey conducted in March 2013 by Vanson Bourne. Responses of 100 senior IT decision-makers in UK commercial enterprises (1000+ employees)