Survey: IT Complexity Is Exposing Organizations to Cybersecurity Risk

Eighty-three percent of security and IT professionals around the world believe that IT complexity is putting their organizations at cybersecurity risk, according to a new survey from Citrix and the Ponemon Institute. Top areas of concern include nation state attackers (80 percent of respondents), breaches involving high-value information (79 percent of respondents), malicious or criminal insiders (76 percent of respondents) and cyber warfare or cyber terrorism (76 percent of respondents).

The survey polled 4,200-plus IT and IT security practitioners across a variety of industries in Australia/New Zealand, Brazil, Canada, China, Germany, France, India, Japan, Korea, Mexico, Netherlands, United Arab Emirates, United Kingdom and the United States. The largest portion of respondents (16 percent) came from the financial services sector; 12 percent of respondents identified the primary focus of their organization as "public sector" or "education and research."

Other findings include:

  • 79 percent of respondents are worried about security breaches involving high-value information;
  • 75 percent of respondents believe their organization is not fully prepared to deal with the potential security risks resulting from Internet of Things;
  • 74 percent said a new IT security framework is needed to improve their organization's security posture and reduce risk;
  • 69 percent reported that their organization's existing security solutions are outdated and inadequate;
  • About eight in 10 respondents (81 percent) are concerned the inability to hire and retain security staff with adequate knowledge and credentials;
  • Employee behaviors topped the list of "human factor risks," with 74 percent of respondents concerned about employee complacency regarding security, 72 percent citing lack of employee awareness of security practices and 71 percent lamenting the inability to control employees' devices and apps;
  • Other risk factors include growth of data assets (cited by 78 percent of respondents), integration of third parties into internal networks and applications (76 percent) and lack of collaboration between IT security and lines of business (76 percent); and
  • Respondents' top three most important technologies for a new IT security infrastructure were identity and access management (rated by 78 percent of respondents), machine learning (77 percent) and configuration and log management (76 percent).

"In every region of the world, businesses must accept the fact that security practices and policies need to evolve in order to deal with threats from disruptive technologies, cyber crime and compliance," said Larry Ponemon, chairman and founder of the Ponemon Institute, in a statement. "The research reveals respondents' awareness of the need to challenge the status quo of their IT security strategies and consider a new IT security architecture to safeguard their organizations from cyber risks."

The full report, "The Need for a New IT Security Architecture: Global Study," is available for free download from the Citrix site (registration required).

About the Author

Rhea Kelly is editor in chief for Campus Technology, THE Journal, and Spaces4Learning. She can be reached at [email protected].

Featured

  • an online form with checkboxes, a shield icon for security, and a lock symbol for privacy, set against a clean, monochromatic background

    Educause HECVAT Vendor Assessment Tool Gets an Upgrade

    Educause has announced HECVAT 4, the latest update to its Higher Education Community Vendor Assessment Toolkit.

  • illustration of a football stadium with helmet on the left and laptop with ed tech icons on the right

    The 2025 NFL Draft and Ed Tech Selection: A Strategic Parallel

    In the fast-evolving landscape of collegiate football, the NFL, and higher education, one might not immediately draw connections between the 2025 NFL Draft and the selection of proper educational technology for a college campus. However, upon closer examination, both processes share striking similarities: a rigorous assessment of needs, long-term strategic impact, talent or tool evaluation, financial considerations, and adaptability to a dynamic future.

  • university building surrounded by icons for AI, checklists, and data governance

    Improving AI Governance for Stronger University Compliance and Innovation

    AI can generate valuable insights for higher education institutions and it can be used to enhance the teaching process itself. The caveat is that this can only be achieved when universities adopt a strategic and proactive set of data and process management policies for their use of AI.

  • DeepSeek on AWS

    AWS Offers DeepSeek-R1 as Fully Managed Serverless Model, Recommends Guardrails

    Amazon Web Services (AWS) has announced the availability of DeepSeek-R1 as a fully managed serverless AI model, enabling developers to build and deploy it without having to manage the underlying infrastructure.