54% of firms will increase their cyber-security budgets in 2019
.jpg)
Over half of all organisations will increase their cyber-security spending this year, with almost a third of them planning to boost their cyber-security budgets by 10 to 20 percent, eSecurity Planet's 2019 State of IT Security survey has found.
The detailed survey of CEOs, CIOs and IT security professionals at a large number of organisations of all sizes also noted that over half of all organisations (57 percent) are also planning to hire additional IT security professionals this year. The renewed spending on cyber-security has been driven mostly by the fear of data breaches and the arrival of new privacy regulations such as GDPR.
Michael Kerner, a senior security editor for eSecurity Planet, said that the responses to the survey indicate that organisations are responding to the challenges and are not idly sitting by waiting for the next breach. According to the report, in order to counter increasingly sophisticated attacks and protect data from breaches that could lead to steep fines under the EU's GDPR, organisations have begun purchasing security products in large numbers.
CEOs, CIOs and security professionals interviewed by eSecurity Planet said that while IT services companies are looking to buy the latest web gateways, network access control, DLP, deception technology, UEBA, phishing simulation and patch management solutions, leading business services firms are going for DLP, SIEM and DDoS protection solutions.
While one in four CEOs, CIOs, and security professionals at organisations trust network access controls the most, 24.2 percent of them are planning to deploy DNS filtering solutions, 20.8 percent are planning to deploy antivirus solutions and another 20 percent are planning to deploy web gateways.
However, many organisations are also shunning some security solutions as they believe such solutions are ineffective against emerging cyber-threats. While one in four IT security professionals do not trust phishing simulation products, 20 percent are unconvinced about the effectiveness of breach and attack simulation (BAS) technology.
The report also noted that while two-thirds of organisations are conducting penetration testing at least once a year, another 60 percent are also conducting threat-hunting exercises annually to prepare for cyber-attacks. They are doing so to address their concerns about database security, advanced persistent threats (APTs), DDoS attacks, insider threats and ransomware.
Even though it is encouraging to note that over half of organisations are willing to invest their money in securing and protecting customer data, almost 70 percent of organisations that are hiking their budgets are mid-sized or large organisations, indicating that a vast majority of small businesses that process customer data are either unwilling or unable to increase their cyber-security budgets or hire additional IT security personnel.
Security Planet also noted that of those organisations that will be unable to increase their cyber-security budgets this year, 62 percent are companies that employ fewer than 100 staff.
Commenting on the survey's findings, Ilia Kolochenko, CEO of High-Tech Bridge, told SC Media UK that spending more does not necessarily means spending better as doing so lures organisations into a false sense of security considering that many organisations still do not have a risk-based, long-term cyber-security strategy to allocate necessary resources and authority within the security team in a consistent and coherent manner.
"Few organisations have an up-to-date and comprehensive inventory of their digital assets, leaving many systems and applications without maintenance or updates. The problem is aggravated by IoT proliferation, BYOD, cloud and data sharing with third-parties. Ultimately, today very few organisations have a holistic control over their data.
"They increasingly spend more, but often the increase is spent on general expansion of IT infrastructure (eg, they need more or upgraded licenses from the same vendors), rather than the higher priority of cyber-security in their corporate risk mitigation plan.
He added that scared by exorbitant FUD (fear, uncertainty and doubt) in the media and from some vendors, organisations’ desultory spend on various consultants to attain paper-based compliance often ignore practical aspects of security. They distract their security personnel from more important tasks thereby skyrocketing their susceptibility to data breaches.
"Eventually, cyber-security professionals start suffering from burnout and their productivity falls. I believe that with a proper cyber-security strategy, most organisations will not only manage to handle their cyber-security without new hires, but will manage to cut [unnecessary] cyber-security spending," he added.

Latest Jobs
-
- IAM Consultant- OKTA
- Germany
- upto €90,000 plus benefits
-
I am looking for an experienced IAM process Manager to help drive forward a series of IAM implementation for a global Manufacturing business, Ideally you will be skilled with Okta and have knowledge of PAM Solutions, You will be responsible for: Driving the design and continuous improvement of complex IAM solutions in close collaboration with business partners Consult on the optimisation of IAM processes and design proper IT-based solutions to meet availability and quality targets Define technical specifications for SW-development (standards, design patterns, test cases, scenarios) and manage the life cycle of designed solutions Actively scan for relevant innovations and new technologies to identify further potential for improving IAM solutions and processes using OKTA Analyse new features of the regular Okta releases We are looking for someone with strong IAM experience as an Architect, Analyst, Technical Engineer, or similar role in the Identity and Security domain Experience with relevant certifications in development/administration, design and configuration of the Okta IAM platforms Familiar with LCM - joiners, movers, leavers, application federation - SAML, OIDC, SCIM and many other IAM terms Good mix of competences in IAM business process and project management concepts and tools e.g., ServiceNow, Jira, PRINCE2, SCRUM (agile)
-
- SAP Security Consultant
- France
- upto €70,000 plus benefits
-
I am looking for an experienced SAP Security Consultant. The ideal candidate will have a strong understanding of SAP security concepts and be able to apply them to real-world scenarios. ideally you will also have experience with Securitybridge or Onapsis, or a similar SAP security tool. Your responsibilities will include: Reviewing and auditing SAP security settings and controls Identifying and remediating security vulnerabilities Implementing security best practices Educating users on SAP security Experience experience in SAP security Experience with Securitybridge or Onapsis, or a similar SAP security tool would be very advantageous Strong understanding of SAP security concepts Excellent problem-solving and analytical skills Excellent communication and presentation skills Fluent in French & English
-
- Post Grad MSc Cyber security - Junior Cyber Risk Analyst wanted. UK
- United Kingdom
- Entry role
-
The perfect start to your new Cyber Security Career. Post Graduate Cyber Risk Analyst Wanted. Are you are fresh from earning your Cyber Security MSc and eager to start your career in Cyber Security? We are looking for a recent post graduate to join a forward thinking Cyber Security Consultancy for the ideal entry role into Cyber Security. Whilst employed industry experience is not expected, as full training and support will be provided, a history of recent education in Cyber Security / Cyber Risk is essential. We are looking for someone with an inquisitive mind, who is confident to ask the right questions and who isn't afraid to challenge the status quo. Superb communication skills are a must (in person, written and verbal) This is a UK based role that is remote first with monthly travel (1-2 a month) to meet with the team and in time to meet clients. If you aren’t available to travel this isn’t the opportunity. We are unable to provide VISA sponsorship as there will be a requirement to achieve Security clearance If you're adaptable, open to fresh perspectives, and excited to be part of a forward-thinking team and looking for an opportunity to help make a difference in a Cyber consulting role, this opportunity is for you. For more information apply here……
-
- Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared
- London
- OUTSIDE IR35
-
Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared • We require someone that has experience of migration exchange from windows server 2012 to 2019. • In depth understand of On-Prem exchange server management and deployment. • Experience migrating On-Prem exchange servers from 2012 upwards. • Secure Email Gateway experience essential Due to the nature of the requirement the individual must be commutable to London 2-3 days a week.