cxo voice
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

McAfee research report reveals more than 50 percent of IT professionals have faced data breach

News Desk by News Desk
April 30, 2019
Mcafee data breach report

McAfee’s New research report of Grand Theft Data II – The Drivers and Shifting State of Data Breaches revealed that cyber security still a big challenge for organizations and IT professionals. McAfee’s data breach report shows approx 61 percent IT security professionals faced serious data breaches.

Key findings of McAfee’s research report

  1. Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB drives.
  2. Nearly three-quarters of all breaches require public disclosure, putting brand reputation at risk.
  3. Eighty-one percent of IT professionals report separate policies or management consoles for cloud access security broker (CASB) and data loss prevention (DLP).
  4. Intellectual property (IP) surpasses payment card data to tie personally identifiable information (PII) as top target for thieves.

“Threats have evolved and will continue to become even more sophisticated,” said Candace Worley, vice president and chief technical strategist at McAfee. “Organizations need to augment security measures by implementing a culture of security and emphasizing that all employees are part of an organization’s security posture, not just the IT team. To stay ahead of threats, it is critical companies provide a holistic approach to improving security process by not only utilizing an integrated security solution but also practicing good security hygiene.”

McAfee’s Research Data highlights the following 6 Points

1. Savvier thieves

Data is now being stolen by a wide range of methods, with no single technique dominating the industry. The top vectors used to exfiltrate data are database leaks, cloud applications and removable USB drives.

2. IP tied for 1st

Personally identifiable information (PII) and intellectual property (IP) are now tied as the data categories with the highest potential impact to 43% of respondents. Notably, PII is of greater concern in Europe (49%), most likely due to the recent enforcement date of the General Data Protection Regulation (GDPR). In Asia-Pacific countries, intellectual property theft is of greater concern (51%) than PII.  

3. Blame game

IT is looked at as the culprit with 52 percent of respondents claiming IT is at fault for creating the most data leakage events. Business operations (29 percent) follows as the next most likely to be involved. Highly regulated internal groups including finance (12 percent) and legal (6 percent) were the most secure.

ADVERTISEMENT

4. The great divide

Security technology continues to operate in isolation, with 81 percent reporting separate policies or management consoles for cloud access security broker (CASB) and data loss prevention (DLP), resulting in delayed detection and remediation actions.

5. Taking responsibility

There is a rift in regard to accountability – 55 percent of IT professionals believe that c-level executives should lose their job if a breach is serious enough, yet 61 percent also state that the c-level executives they work with expect more lenient security policies for themselves.

6. Future proofing

IT professionals are taking action, with almost two-thirds stating they have purchased additional DLP, CASB and endpoint detection solutions over the last 12 months. Respondents believe that between 65 and 80 percent of breaches experienced would have likely been prevented if one or more of these systems had been installed.

The stakes are higher as multiple attack methods are now used in a breach as cybercriminals continue to target personal data and intellectual property. Furthermore, cyber security challenges IT security teams are increasingly concerned about external threat actors compromising their network, which has forced more organizations to publicly disclose when breaches occur. The severity of publicly disclosing breaches results not only in financial repercussions but damage to brand and reputation as well.

News Desk

News Desk

by CXO VOICE team memebrs, [email protected]

Related Posts

Sophos Cyber Insurance f
Cyber Security

Unlocking Cyber Resilience: Sophos and Capsule Partner to Simplify Cyber Insurance for Businesses

May 21, 2025
Online Scams
Cyber Security

Airtel Launches AI-Powered Security Solution to Protect Customers from Online Scams

May 16, 2025
Secure Browsers
Cyber Security

The Rise of Secure Enterprise Browsers (SEBs): A Game Changer for Remote Work and Endpoint Security by 2028

April 29, 2025
Palo Alto Protect AI
Cyber Security

Palo Alto Networks to Acquire Protect AI, Amplifying AI Security Solutions

April 29, 2025
F-Secure and Orange
Cyber Security

F-Secure teams up with Orange to help protect consumers from online threats and scams

April 24, 2025
Attackers
Cyber Security

Most Attackers Logged In Instead of Breaking In: Sophos Report

April 3, 2025
Vodafone IBM
Cyber Security

Vodafone and IBM Collaborate to Strengthen Smartphone Security with Quantum-Safe Cryptography

March 3, 2025
Verizon Accenture
Cyber Security

Verizon and Accenture Forge Strategic Alliance to Develop Advance Cybersecurity Solutions for Businesses

March 3, 2025
Load More
ADVERTISEMENT

Latest Updates

Venu Lambu

Debashis Chatterjee Retires as LTIMindtree CEO; Venu Lambu Appointed as Successor

by Deepa Sharma
3 days ago

Lenovo and Motorola FIFA Club World Cup 2025

Lenovo and Motorola announce partnership with FIFA Club World Cup 2025™

by News Desk
3 days ago

Dora Liu Deloitte

Dora Liu Appointed CEO of Deloitte China, Set to Advance Growth with ‘1-2-3 Strategy’

by Deepa Sharma
3 days ago

Salesforce Amsterdam

Salesforce Expands European Presence with New Amsterdam Office

by Deepa Sharma
3 days ago

Kore.ai

Kore.ai Partners with AWS to Transform Customer Experiences with Integrated AI Solutions

by Deepa Sharma
5 days ago

Antony Cahill Visa

Antony Cahill Set to Lead Visa’s European Operations as Charlotte Hogg Departs for New Opportunity

by Deepa Sharma
6 days ago

Expert Views

Opinion

When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms

May 20, 2025
Molly Sands AI
AI

AI RIP: 5 Things Knowledge Workers Will Say ‘Sayonara’ to in the Next Decade

March 8, 2025
multi cloud
Cloud

Multi-Cloud Made Simple: Strategies for Smart Business Management

March 5, 2025
Soft Skills
Opinion

Soft Skills and Technical Know-How: A Winning Combination in the Tech Industry

March 4, 2025
Digital Freedom
Cyber Security

Your Data, Their Gold: The Silent Battle for Digital Freedom

February 25, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-
Interview on Counterfeit products with Nikhil Narayan
Leaders Talk

Advancements in ML & AI made it possible to detect counterfeit products in real-time, says Nikhil Narayan

-
Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami
Leaders Talk

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami

-
AI chatbots, Prasanna-Kumar
Leaders Talk

Can AI chatbots enhance customer experience and reduce the cost of serving customers?

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release

Copyright © 2025 CXOVoice - All Right Reserved