cxo voice
  • Business
  • Technology
    • Artificial Intelligence
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • CXO Insights
  • Cyber Security
  • CXO Interviews
No Result
View All Result
  • Business
  • Technology
    • Artificial Intelligence
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • CXO Insights
  • Cyber Security
  • CXO Interviews
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home Cyber Security

McAfee research report reveals more than 50 percent of IT professionals have faced data breach

News Desk by News Desk
April 30, 2019
Mcafee data breach report

McAfee’s New research report of Grand Theft Data II – The Drivers and Shifting State of Data Breaches revealed that cyber security still a big challenge for organizations and IT professionals. McAfee’s data breach report shows approx 61 percent IT security professionals faced serious data breaches.

Key findings of McAfee’s research report

  1. Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB drives.
  2. Nearly three-quarters of all breaches require public disclosure, putting brand reputation at risk.
  3. Eighty-one percent of IT professionals report separate policies or management consoles for cloud access security broker (CASB) and data loss prevention (DLP).
  4. Intellectual property (IP) surpasses payment card data to tie personally identifiable information (PII) as top target for thieves.

“Threats have evolved and will continue to become even more sophisticated,” said Candace Worley, vice president and chief technical strategist at McAfee. “Organizations need to augment security measures by implementing a culture of security and emphasizing that all employees are part of an organization’s security posture, not just the IT team. To stay ahead of threats, it is critical companies provide a holistic approach to improving security process by not only utilizing an integrated security solution but also practicing good security hygiene.”

McAfee’s Research Data highlights the following 6 Points

1. Savvier thieves

Data is now being stolen by a wide range of methods, with no single technique dominating the industry. The top vectors used to exfiltrate data are database leaks, cloud applications and removable USB drives.

2. IP tied for 1st

Personally identifiable information (PII) and intellectual property (IP) are now tied as the data categories with the highest potential impact to 43% of respondents. Notably, PII is of greater concern in Europe (49%), most likely due to the recent enforcement date of the General Data Protection Regulation (GDPR). In Asia-Pacific countries, intellectual property theft is of greater concern (51%) than PII.  

3. Blame game

IT is looked at as the culprit with 52 percent of respondents claiming IT is at fault for creating the most data leakage events. Business operations (29 percent) follows as the next most likely to be involved. Highly regulated internal groups including finance (12 percent) and legal (6 percent) were the most secure.

4. The great divide

Security technology continues to operate in isolation, with 81 percent reporting separate policies or management consoles for cloud access security broker (CASB) and data loss prevention (DLP), resulting in delayed detection and remediation actions.

5. Taking responsibility

There is a rift in regard to accountability – 55 percent of IT professionals believe that c-level executives should lose their job if a breach is serious enough, yet 61 percent also state that the c-level executives they work with expect more lenient security policies for themselves.

6. Future proofing

IT professionals are taking action, with almost two-thirds stating they have purchased additional DLP, CASB and endpoint detection solutions over the last 12 months. Respondents believe that between 65 and 80 percent of breaches experienced would have likely been prevented if one or more of these systems had been installed.

The stakes are higher as multiple attack methods are now used in a breach as cybercriminals continue to target personal data and intellectual property. Furthermore, cyber security challenges IT security teams are increasingly concerned about external threat actors compromising their network, which has forced more organizations to publicly disclose when breaches occur. The severity of publicly disclosing breaches results not only in financial repercussions but damage to brand and reputation as well.

News Desk

News Desk

by CXO VOICE team members, [email protected]

Related Posts

AI-enabled cyberattacks
Cyber Security

2026 X-Force Threat Index Warns of AI-Enabled Exploits and Rising Cyberattacks

February 26, 2026
Kyndryl cyber
Cyber Security

Kyndryl Launches First Cyber Defense Operations Center in Bengaluru

February 19, 2026
Palo Alto Acquisition of CyberArk
Cyber Security

Palo Alto Networks Completes Acquisition of CyberArk to Lead in AI-Era Security

February 12, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

February 10, 2026
Cyber Attacks AI
Cyber Security

Cyber Attacks Surge 70% as AI-Powered Threats Reach Record Levels, Check Point Report

January 29, 2026
Check Point Exposure Management
Cyber Security

Check Point Unveils AI-Driven Exposure Management to Close Cybersecurity Remediation Gap

January 22, 2026
Cybersecurity predictions 2026
Cyber Security

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

December 23, 2025
Home Routers
Cyber Security

The Home Router Crisis of 2026: How India’s Living Rooms Became the New Cyberwar Frontline

December 23, 2025
Load More

More Articles

OpenAI

Amazon, Nvidia, and SoftBank Power OpenAI’s Historic $110 billion Capital Raise

by Deepa Sharma
February 28, 2026

HCLTech and IIT Kanpur

HCLTech, IIT Kanpur Forge Alliance to Accelerate Deep Tech Innovation for GCCs

by Deepa Sharma
February 27, 2026

MeltPlan

MeltPlan Raises $10 Million Seed Round to Build AI Layer for Preconstruction Planning

by Arshi Khan
February 26, 2026

AMD and Nutanix

AMD and Nutanix Forge $250M Strategic Partnership to Build Open Enterprise AI Infrastructure

by Deepa Sharma
February 26, 2026

Get Weekly CXO Intelligence.

[wpforms id="31079"]

CXO Insights

AI India
Artificial Intelligence

AI as a Public Good: From Democratic Principles to Ground-Level Practice

by News Desk
February 13, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

by Sunil Sharma
February 10, 2026
HDDs storage
Opinion

5 Reasons HDDs Will Continue to Dominate Enterprise Storage in the AI Era

by Owais Mohammed
January 13, 2026
Cybersecurity predictions 2026
Cyber Security

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

by Heba Sayed
December 23, 2025

CXO Interviews

1Point1
Business

How 1Point1 Solutions Is Betting Its Future on AI to Redefine BPM

>
NewgenONE
Business

Reimagining Enterprise Transformation: Varun Goswami on the Future of NewgenONE and AI-Driven Automation

>
Jagat Shah, Chairman & CEO of MITSUMI Group
Business

Leadership in Emerging Markets: Exclusive Interview with Jagat Shah, Chairman & CEO of MITSUMI Distribution

>
Tokenization
Blockchain

Revolutionizing Finance: An Exclusive Interview with Sid Ugrankar, Co-founder of Qila.io on the Future of Blockchain and Tokenization

>

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. We publish informed analysis, news reporting, expert commentary, and expert insights across enterprise technology, digital transformation, cybersecurity, data, AI, sustainability, and governance.

Connect with us

Easy Links

  • Cryptocurrency
  • Company Announcements
  • Event
  • Blockchain
  • Resources & Downloads
[wpforms id="30660"]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Editorial Policy
  • Feedback

Copyright © 2026 CXOVoice - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • News
  • Business
  • Technology
  • Cyber Security
  • Opinion

Copyright © 2026 CXOVoice - All Rights Reserved