Cybersecurity Failings Begin In The C-Suite: Study

You can blame criminals for email ransomware attacks. But some of the fault belongs in-house — in the C suite, according to The State Of Email Security, a study from Mimecast based on research by Vanson Bourne.

Of the executives surveyed, 37% say their organization’s CEO is a weak link in their cybersecurity operation, compared to 27% who said this was the case in 2017. And 38% feel their CEO undervalues the role of email security — the same percentage as last year.

Executives may want to dump responsibility on IT — 78% say that's where it belongs, including the IT people surveyed.  

Yet that lack of focus at the top may account for the substandard training. Only 11% of firms continuously train employees in cybersecurity. However, 24% mandate monthly training, and 52% mandate training quarterly or once a year.

This failing, in turn, may be caused by an overreliance on technology. A third of the respondents see tech investments as their best defense, and 29% believe in improved business processes.

There is no doubt that a cyber threat exists. A full 92% have seenransomware delivered via email attachments in the past year, and 90% say that phishing attacks have increased or remained the same in that period.

In addition,  61% have suffered attacks in which an infected user spread malicious activity to other employees via email.  

And this has harmed companies — 59% fear they will suffer a negative business impact from an email-borne attack this year.

One of the negative effects is financial loss — 20% of the victims report it. Then there is downtime. That lasted more than one day for 78% of the victims. But 46% say it amounted to two to three days, and 27% said it lasted for four to five days.

Mimecast and Vanson Bourne surveyed 800 IT decision makers and C-level executives across the globe.

C-level types are also the most likely to mistakenly pass on malware. Asked the main types of in-house sharing, 31%, say that a member of the C-suite sent sensitive data emails to the wrong address by accident. However, that percentage has fallen from 35% in 2016 and 2017.

And for 27%, it’s that an employee sent sensitive information to the wrong address by email — also down from 25% in the 2016/17 period.

In addition, only 20% said sensitive data was sent by an employee in response to a phishing email, down from 29%.

At the same time, 38% say that none of this has happened to them — up from 31%.

Mimecast concludes that firms need a cybersecurity strategy, and reports that 80% of firms that have them in place are ready to fight ransomware. It describes the four key capabilities as threat protection, adaptability, durability and recoverability. 

Next story loading loading..