Current study proves: Shortage of skilled workers and fear of cyberattacks determine IT security  

A study by G DATA, Statista and brand eins confirms that IT security in the DACH region is in a poor state. Many organizations still believe that attackers are not interested in them. The organizations that are aware of the dangers are plagued by staff shortages: qualified IT security experts are scarce. Quote from the study: “In companies with fewer than 50 employees, 68 percent talk about a lack of personnel. In large companies with more than 1,000 employees, only 11.3 percent complain of a lack of personnel.”

IT security: prevention instead of reaction

The fear of an IT emergency is great, regardless of the size of the organization. In our opinion, prevention is the order of the day. A holistic IT and information security strategy not only includes planning for an emergency (“incident response”), but also precisely those activities that prevent an emergency from happening in the first place.

Detect threats with Penetration Testing & Vulnerability Scanning Services

At TEN Information Management, we are committed to preventive IT and information security. We help companies to take precautions and recognize dangers before real attackers do – with our Penetration Testing & Vulnerability Scanning Services, simulated phishing campaigns – as well as advice and assistance on IT security strategy. Interested? Then make an appointment for a free initial consultation right away.

Tags

Share post

More articles

Detect threats with a SIEM system A security information and event management (SIEM) system is a powerful solution that helps organisations detect, monitor and respond to threats to their information security. It enables the centralised...
Risk precautions are supposedly just as unwelcome as health precautions. But they are just as important! Various studies prove: Attacks on IT systems and applications are increasing significantly. The consequences are financially devastating. At the...
Privilege escalations in applications – often referred to as privilege escalation – are vulnerabilities that allow attackers or even regular users to access data, information or system functions for which they have no authorization. Attackers...