a research initiative by axis communications€¦ · survey methodology and respondent profiles the...

24
The state of cybersecurity in 2018: End customer Summary report A research initiative by Axis Communications

Upload: others

Post on 09-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

The state of cybersecurity in 2018:

End customerSummary report

A research initiative by Axis Communications

Page 2: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

ContentsBackground & executive summary

Results• The growth of connected infrastructure• Priorities and preparedness• Concern with security technologies• Maturity of infrastructures and advisers• Experience of cyber attacks and data breaches• The main hurdles to improved cybersecurity• Familiarity with cybersecurity technologies• The use of unique passwords and cameras

Methodology

Page 3: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

BackgroundThe World Economic Forum now ranks cyber attacks as the third most serious global business threat in 2018. Meanwhile, over 90% of successful data breaches are rooted in policy and process shortcomings that lead to human error, poor configurations and poor maintenance practices.

Most organizations are aware of cyber threats – but say they are inadequately prepared to meet them. But to what extent? And in which areas are they looking for support?

In 2018, Axis Communications and Genetec conducted a survey amongst end customers to better understand how aware they were of cyberthreats, how cybersecurity impacted their business and how prepared those companies said they were. This report highlights the thoughts and opinions of security management professionals in 175 end customer organizations.

- During the past five years, the share of infrastructure connected to the internet (IoT) has risen significantly.

- The awareness of cyber threats is high, but many organizations are still not working proactively with the subject.

- Security maturity of their own infrastructure, as well as of external integrators and installers, is seen as medium to high by most organizations.

- Cyber attacks are common and a high share of the respondents’ organizations have been victims. Attacks are typically very costly and require considerable reconstruction of security measures and re-training of employees. Loss of trust following a cyber attack is another major issue.

- Data breaches are not as common but could also be costly. Reputational damage and loss of information are concerns. Data breaches, too, often require new security measures and training of staff.

- Concern about potential attacks is only moderate: three on average, on a five-point scale.

Executive summary

Page 4: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Survey results: The growth of

connected infrastructure

Page 5: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Question: Five years ago, what estimated percentage of your infrastructure was connected to the internet (had an IP address)?

Question: Today, what estimated percentage of your infrastructure is connected to the internet (has an IP address)?

The majority of end customers say that 50-70% of their infrastucture

was connected in 2013...

...and that 80-100% is connected in 2018.

Page 6: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Survey results: Priorities and preparedness

Page 7: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Question: What is the organizational priority on IoT Security?

15%Around

of end customers say they are well prepared

87%Around

prioritize cyber as a risk

Question: How prepared is your organization for cybersecurity threats?

Page 8: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Survey results: Concern with

security technologies

Page 9: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

76%of end customers stated that

safety and physical protection of assets are their main responsibilities.

Physical Protection of Assets

and Life Safety

Intellectual Property/Data

Security

Risk Management

Oversee incident response and

investigation of security breaches

Manage external security service

providers

Coordinate External Independent

Security Audits

100%

90%

80%

70%

60%

50%

40%

30%

20%

10%

0%

Question: What are your professional responsibilities?

Page 10: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

1Security

technology was the

#1 concern

Security technologies

Operational technologies

Cloud technology

External vendor/partners

Point of transaction

Data storage

Mobile devices

New technologies

are not sufficiently

vetted

Other (please specify)

100%

90%

80%

70%

60%

50%

40%

30%

20%

10%

0%

Question: What specific vectors or technologies comprise your primary concerns for cybersecurity?

Page 11: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

1 0%mentioned internal attack factors

in data breaches suffered

Malware Ransomware Stolen devices Social engineering or phishing

Internal attacks

Other (please specify)

100%

90%

80%

70%

60%

50%

40%

30%

20%

10%

0%

Question: What sort of exploit factors were used in the data breach?

Page 12: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Survey results: Maturity of infrastructures

and advisers

Page 13: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Security technologies, as well as integrators and installers, were rated

”Good” in terms of cyber maturity.

Question: Provide overall grades for the security maturity of IoT devicesand technologies and integrators and installers of IoT appliances that are considered for connection to your organizational infrastructure

Page 14: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Survey results: Experience of cyber attacks

and data breaches

Page 15: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

28%

11%

of end customers know they experienced a cyber attack

in the past 12 months.

of end customers know they experienced a data breach

in the past 12 months.

Question: Has your organization experienced a cyberattack in the past 12 months?

Question: Has your organization experienced a data breach in the last 12 months?

Page 16: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Survey results: The main hurdles to

improved cybersecurity

Page 17: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

59%

57%

of end customers see legacy systems as a hurdle.

of end customers point to low internal priorities and the lack

of relevant competence.

Question: What are the primary hurdles to your organization addressing IoT threats?

Page 18: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Survey results: Familiarity with

cybersecurity technologies

63%

71%

of end customers are not familiar with X.509 certificates.

say FIPS 140-2 certification is not important or are uncertain.

Page 19: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

63%

71%

of end customers are not familiar with X.509 certificates.

say FIPS 140-2 certification is not important or are uncertain.

Question: Are you familiar with X.509 certificates?

Question: Is FIPS 140-2 certification for a VMS something important to you?

Page 20: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Survey results: The use of unique

passwords and cameras

change default login passwords for server admin accounts

use HTTPS cameras

Page 21: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

78%

76%

79%

of end customers change default login passwords for admin accounts

change default login passwords for server admin accounts

use HTTPS cameras

Question: Do you change the default password on the admin account or use the default one?

Question: Do you change the default password to log in to the Server Admin or you use the default one?

Question: Are you using HTTPS on compatible cameras with Security Center?

Page 22: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Survey methodology

Page 23: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

Surveymethodology and respondent profilesThe results presented are based on input from 175 organizations. All respondents are members of ASIS International, the world’s largest organization for security management professionals.

Below is a profile of the survey respondents:

work in private for-profit companies

have a Bachelor’s or post-graduate degree

work in the commercial sector

stated that safety and physical protection of assets were their main responsibilities

60% 49%

80% 76%

Page 24: A research initiative by Axis Communications€¦ · Survey methodology and respondent profiles The results presented are based on input from 175 organizations. All respondents are

©2018 Axis Communications AB. AXIS COMMUNICATIONS, AXIS, ETRAX, ARTPEC and VAPIX are registered trademarks or trademark applications of Axis AB in various jurisdictions. All other company names and products are trademarks or registered trademarks of their respective companies. We reserve the right to introduce modifications without notice.

About Axis CommunicationsAxis enables a smarter and safer world by creating network solutions that provide insights for improving security and new ways of doing business. As the industry leader in network video, Axis offers products and services for video surveillance and analytics, access control, and audio systems. Axis has more than 3,000 dedicated employees in over 50 countries and collaborates with partners worldwide to deliver customer solutions. Axis was founded in 1984 and has its headquarters in Lund, Sweden. For more information about Axis, please visit our website www.axis.com.