IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed light on the growing concerns within the cybersecurity community.

The survey, which gathered insights from over 800 IT and security executives globally, reveals a stark reality: 92% of respondents have observed a surge in cyber-attacks compared to the previous year.

The complexity and frequency of these attacks are putting unprecedented pressure on organizations, with a significant 73% having suffered monetary losses due to cyber incidents.

Vulnerable Sectors Under Siege

Cybercriminals are not indiscriminate in their targets. The survey identifies IT services, financial operations, and supply chain management as the most frequently attacked sectors within organizations.

The hospitality/travel, manufacturing, and financial services industries are also facing weekly and monthly attacks, with ransomware and phishing topping the list of concerns.

Industries at Risk

The New Wave of Sophisticated Attacks

The findings from Keeper Security’s survey highlight the urgent need for organizations to adapt their cybersecurity strategies to counter both existing and emerging threats.

A staggering 95% of IT leaders acknowledge that cyber-attacks are increasing in frequency and sophistication.

The most serious emerging threats include AI-powered attacks, deepfake technology, supply chain attacks, cloud jacking, IoT attacks, 5G network exploits, and fileless attacks.

AI-powered attacks are particularly concerning, as they enable cybercriminals to automate and scale traditional attack techniques like phishing and password cracking.

This has led to a call for a proactive cybersecurity approach that combines advanced defense mechanisms with fundamental best practices.

To combat these threats, IT leaders are planning to increase their AI security measures through data encryption (51%), employee training and awareness (45%), and advanced threat detection systems.

In North America, the focus is equally split between threat detection systems and data encryption, each at 50%.AI Security Measures

Phishing remains a significant challenge, with 67% of companies struggling to combat these attacks.

The rise of AI tools has made phishing scams more believable and harder to detect, with 84% of respondents finding them more difficult to identify.

Insider Threats and the Importance of PAM

Not all threats come from the outside; 40% of respondents have faced attacks from within their organization.

Privileged Access Management (PAM) solutions are crucial for managing and securing privileged credentials and enforcing the principle of least privilege to minimize damage from potential insider threats.

Despite the evolving threat landscape, fundamental cybersecurity practices remain crucial. Organizations are encouraged to adopt password and PAM solutions to prevent prevalent attacks.

A password manager can enforce strong password practices, while PAM solutions control and monitor high-level access.

These measures create a layered security approach that enhances overall cybersecurity resilience.

As cybercriminals continue to refine their tactics, IT and security leaders must remain vigilant and proactive in their defense measures to protect their organizations’ digital landscapes.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Anupriya

Recent Posts

Ransomware Group Actively Exploits Windows CLFS Zero-Day Vulnerability

Microsoft has uncovered a sophisticated ransomware campaign exploiting a zero-day vulnerability in the Windows Common…

12 minutes ago

CISA Issues Alert on Active Exploits of Windows CLFS Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding active exploitation…

2 hours ago

Apache mod_auth_openidc Flaw Lets Unauthenticated Users Access Protected Data

A critical flaw in Apache mod_auth_openidc (versions ≤2.4.16.10) allows unauthenticated attackers to bypass authentication and access protected…

3 hours ago

NCSC Issues Alert on MOONSHINE and BADBAZAAR Mobile Malware

GCHQ’s National Cyber Security Centre (NCSC), in collaboration with international and industry partners, has issued…

3 hours ago

20 Best Incident Response Tools in 2025

In today's digital era, organizations face an ever-growing threat landscape, with cyberattacks, data breaches, and…

4 hours ago

Chrome Use-After-Free Vulnerability Enables Remote Code Attacks

Google has rolled out a critical update for its Chrome browser, addressing a high-severity vulnerability…

4 hours ago