Connect with us

Hi, what are you looking for?

HEADLINES

Miscommunications in IT security lead to cybersecurity incidents in 62% of companies

98% of non-IT respondents experienced miscommunications regarding IT security. With regards to consequences, most often a breakdown in communications leads to serious project delays (67%) and cybersecurity incidents (62%). Almost one-third of respondents (30% and 27% respectively) even said that they had even encountered these issues more than once.

More than half of top-tier managers (62%) admit that a miscommunication with the IT department or IT security team has resulted in at least one cybersecurity incident in their organizations. In terms of personal attitudes, the majority of non-IT executives cited a diminished sense of cooperation between different teams (34%) and said this situation makes them question their colleagues’ skills and abilities when communication with their IT-security employees was unclear (33%).

The recent Forrester analytics survey says that companies spend an average of 37 days and $2.4 million to detect and recover from a cybersecurity breach. To determine how much mutual understanding between executives and information security teams affects a company’s cyber resilience, Kaspersky conducted a global survey of more than 1,300 business leaders. 

According to the results of the study, 98% of non-IT respondents experienced miscommunications regarding IT security. With regards to consequences, most often a breakdown in communications leads to serious project delays (67%) and cybersecurity incidents (62%). Almost one-third of respondents (30% and 27% respectively) even said that they had even encountered these issues more than once. Among other negative effects are a wasted budget, the loss of a valued employee and deteriorating relationships between teams –situations that occurred to 61% of respondents.

In addition to worsening business indicators, unclear communication with IT-security employees also affects the emotional state of the team and makes executives question IT-security employees’ skills and abilities. Also, 28% executives admit that misunderstandings make them lose confidence in the business’ safety and 26% of them find this situation makes them nervous, which affects their work performance. 

“Clear communication between a company’s executives and IT security management is a prerequisite for corporate business security,”  comments Alexey Vovk, Head of Information Security at Kaspersky.

 ”The challenge here is to put oneself in the others’ position, to anticipate and prevent serious misunderstandings. This means that, on the one hand, CISOs should know the basic business language to better explain the existing risks and need for safety measures. On the other hand, a business should also understand that information security in the 21st century is an integral part of business and budgeting for it is an investment in protecting company assets,” adds Vovk.

To make the communication between IT security and business functions within the company more transparent, Kaspersky recommends the following: 

Advertisement. Scroll to continue reading.
  • Understanding professionals from another sphere requires not only empathy but also additional knowledge. While IT security workers could get more information about basic business terms and concepts in various training courses, non-IT executives have an opportunity to walk in a CISO’s shoes to get insights on the most relevant IT security challenges. 
  • Both IT and non-IT managers should not lock themselves in a professional “information bubble”. Staying aware of the agenda in both the business and cybersecurity worlds is another key to successful communication and mutual understanding between them.
  • Cybersecurity specialists should use reliable and understandable arguments when communicating their needs to the board and justifying their cybersecurity budget. Use information about the threats and security measures most relevant to your particular industry and company size to prove the probability of risks and the protective measures needed. Resources such as IT Security Calculator and reports based on experts’ observations can significantly ease this task.
  • Today when cyber threats are becoming more and more relevant and companies are forced to increase their information security budgets, it’s extremely important to allocate cybersecurity investments to tools with proven efficacy and ROI. This means tools that lower the level of false positives and reduce the time of attack detection, the time spent per case, and other metrics are important to any IT security team.

The full report and more insights on communications issues between C-level and IT security managers are available via the link.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

This demonstrates that despite a slight improvement from last year, cybersecurity preparedness remains low as hyperconnectivity and AI introduce new complexities for security practitioners.

HEADLINES

The Fraud Bureau is a collaborative initiative that unites banks, fintechs, and financial institutions to share data on potentially deceptive applicant activity securely. This...

HEADLINES

Amplifying this risk is the increasing use of artificial intelligence (AI), which introduces new levels of realism and precision that demand heightened vigilance, especially...

HEADLINES

#BeCyberSmart is the PLDT Group’s umbrella campaign for cybersecurity awareness aimed at promoting vigilance against scams, digital hygiene and responsible online behavior, especially among...

HEADLINES

According to a new report from Kaspersky GReAT (Global Research and Analysis Team), the attackers targeted at least six organizations across the software, IT,...

White Papers

Among the primary risks are inadequate security measures and insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT...

HEADLINES

The campaigns show attackers are capitalizing on people’s increasing familiarity with completing multiple authentication steps online – a trend HP calls ‘click tolerance’. 

White Papers

IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on...

Advertisement