SHARE
Facebook X Pinterest WhatsApp

Why It Seems Like Cybersecurity Is a Losing Battle

The Human Factor: 5 Security Blunders People Keep Making If it seems like businesses are fighting a losing battle against malware and other security threats, it could be because they are. A new study conducted by ThreatTrack Security found that security professionals are losing ground in the battle against cybercriminals and other adversaries compared with […]

Written By
SP
Sue Poremba
Feb 1, 2016
Slide Show

The Human Factor: 5 Security Blunders People Keep Making

If it seems like businesses are fighting a losing battle against malware and other security threats, it could be because they are.

A new study conducted by ThreatTrack Security found that security professionals are losing ground in the battle against cybercriminals and other adversaries compared with a similar study conducted two years ago:

The study found organizations still struggle mightily with how to combat cybercrime, despite lessons learned from spectacular cyberattacks on Target, Sony and the U.S. government in the last couple of years. There seems to be a growing sense of realism regarding the difficulties of fighting cybercrime, and it’s clear that analyzing advanced malware still takes too long. For most companies, it takes anywhere from one to 24 hours, despite the availability of tools that enable them to analyze code and malicious behavior in minutes.

According to the study, only 20 percent of respondents to the study said they feel their security defenses have improved since the last study (that’s compared to nearly 40 percent who saw improvement two years ago).

Security budgets are still weak, the study found, and that is hindering response times. At the same time, the bad guys are getting smarter and the security systems currently used aren’t keeping up. Respondents said that their biggest obstacles to better security are the increasing complexity of malware and the sheer volume of malware.

This news comes on the heels of a survey from 451 Research on behalf of Vormetric that revealed nearly everyone in IT (91 percent) is worried that their sensitive data is vulnerable to attack. Garrett Bekker, 451 Research senior analyst and report author, was quoted by eSecurity Planet:

Organizations are also spending ineffectively to prevent data breaches, with spending increases focused on network and endpoint security technologies that offer little help in defending against multistage attacks.

Data Security

If it feels like your security battles are stalled or harder to conquer, you certainly aren’t alone. It really comes down to security being made a higher priority on budget lines, as ThreatTrack President John Lyons said in a formal statement:

[D]espite access to more tools, security analysts – the most critical resource within an enterprise’s cyber defense – remain ill-equipped, underfunded and understaffed in their daily battle against advanced malware.

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.