Skip to content

Survey: IT Leaders Sound Alarm on Cybersecurity Gaps, Plan Recovery Investments

IT leaders are worried about their companies' cybersecurity. A recent survey shows a need for better planning and a more comprehensive approach to cyber risk.

In this image we can see the information board, buildings, shed, trees, electric cables and sky...
In this image we can see the information board, buildings, shed, trees, electric cables and sky with clouds.

Survey: IT Leaders Sound Alarm on Cybersecurity Gaps, Plan Recovery Investments

A recent survey by 11:11 Systems reveals a concerning landscape in cybersecurity. The majority of IT leaders express dissatisfaction with current protections, while a significant number have faced multiple attacks. The report highlights the need for a strategic approach, not just product purchases, to address cyber risk.

11:11 Systems' 'Cyber Risk Quantification' tool helps businesses understand the financial impact of lacking resilience. The tool aligns with NIST standards and focuses on eight core pillars. The survey found that 65% of IT leaders agree on the importance of customizing recovery solutions for application-level recovery and cyber incidents. However, 45% of leaders struggle with the complexity of planning for such incidents.

Despite these challenges, 96% of respondents plan to invest in cyber incident recovery within the next year. This is encouraging, given that 57% of respondents endured two or more cyberattacks in the past year. Interestingly, 74% of respondents worry that integrating AI into their businesses could increase vulnerability to attacks. Additionally, 81% of IT leaders admit their company is overconfident in its cyber incident recovery abilities.

The 11:11 Systems report underscores the urgent need for businesses to reassess their cybersecurity strategies. While investment in recovery is planned, the high number of recent cyberattacks and concerns about AI integration suggest that a more comprehensive, strategic approach is necessary. Addressing cyber risk requires a balance of people, processes, and governance, not just product purchases.

Read also:

Latest