Survey: Intrusion-detection tools, security intelligence top cybersecurity processes in 2016

In 2016, 38 percent of organizations report being the target of a phishing scam, according to a PwC report — making phishing attempts the number one source of cybersecurity incidents.

Advertisement

To address these cyberattacks, organizations use a range of security practices, according to the report, titled the Global State of Information Security Survey 2017. For this survey, PwC collected responses from more than 10,000 C-suite executives, vice presidents and directors of IT and security practices.

Here are the top threat detection tools and processes these executives used in 2016:

1. Intrusion-detection tools: 52 percent

2. Actively monitoring and analyzing information security intelligence: 51 percent

3. Conducting vulnerability assessments: 48 percent

4. Conducting threat assessments: 47 percent

5. Security information and event management tools: 47 percent

6. Threat intelligence subscription services: 45 percent

7. Penetration tests: 44 percent

More articles on health IT:
Study: Do privacy concerns encourage patients to withhold health information?
Illumina taps IBM Watson for cancer data interpretation
Survey: 49% of health IT professionals worry about inappropriate employee use of mobile devices

Advertisement

Next Up in Health IT

Advertisement

Comments are closed.