2017 CYBERTHREAT DEFENSE REPORT
About This Report
Register now to download CyberEdge’s fourth-annual Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,100 IT security professionals representing 15 countries and 19 industries. Key insights from this year’s report include:
- 79% of networks were breached,
compared to 62% three years ago
- 61% compromised by ransomware, but only a third paid a ransom
- 89% experienced a shortfall of available IT security talent
- 75% have adequately invested in cyber insurance
- 21% are not satisfied with Microsoft’s available Office 365 protections
- 76% of IT security budgets are rising
- Malware and spear-phishing are causing the most headaches
- Low security awareness among employees is the greatest inhibitor
1,100 security professionals
By downloading any of the following marketing kit resources, you consent to abiding by the terms of CyberEdge’s acceptable use policy, as depicted in the next tab.
Sample report cover graphic
Sample report figure
Acceptable Use Policy
CyberEdge Group, LLC (“CyberEdge”) encourages third-party organizations to incorporate textual and graphical elements of the Cyberthreat Defense Report into presentations, reports, website content, product collateral, and other marketing communications without seeking explicit written permission from CyberEdge, provided such organizations adhere to this acceptable use policy. The following rules apply to referencing textual and/or graphical elements of this report:
Report distribution. Only CyberEdge and its authorized research sponsors are permitted to distribute this report for commercial purposes. This restriction does preclude reproduction of the report for internal uses, such as a training.
Source citations. When citing a textual and/or graphical element from this report, you must incorporate the following statement into a corresponding footnote or other citation: “Source: 2017 Cyberthreat Defense Report, CyberEdge Group, LLC.”
Quotes and excerpts. Quotes and excerpts extracted from this report must not be modified in any way. Rephrasing is not permitted.
Figures and tables. Figures and tables extracted from this report must not be modified in any way. Artwork for figures and tables for the most recent Cyberthreat Defense Report can be found within the Marketing Kit tab on this web page.
No implied endorsements. CyberEdge does not endorse technology vendors. Cited CyberEdge content should never be used to imply favor from CyberEdge.
If you have questions about this policy or would like to incorporate content from this report in a manner not addressed by this policy, submit an email to firstname.lastname@example.org.