The current epidemiological threat situation and the associated widespread adoption of remote work are certainly changing the understanding of organizational security.
In the near future, increased interest in cloud solutions can be expected among Polish enterprises. Especially since leading cloud infrastructure providers have started working on building regional data processing centers located in Poland.
-
43% of companies in Poland used cloud solutions before the COVID-19 pandemic outbreak, of which 5% used only cloud services. Most commonly, organizations use websites and email located in the cloud.
-
The majority (62%) of Polish companies do not know what model they use for the cloud. The view also prevails that using the cloud does not bring security benefits. This may indicate a significant need to educate Polish companies in this area.
-
Organizations do not perceive the problem of so-called shadow IT. Only 8% admitted that business orders cloud services bypassing IT and security departments.
-
The main security benefit of using the cloud that Polish enterprises (6 out of 10 companies) see is ensuring business process continuity, which is a key aspect allowing companies to minimize the negative effects of downtime caused by the COVID-19 pandemic.
-
The scale of cyberattacks among companies operating in Poland is decreasing. In 2019, at least one cyber incident was recorded by 54% of organizations. This represents a decrease of 14 percentage points compared to the previous edition of the study.
-
Lack of sufficient budget for security is the biggest limitation indicated by 64% of companies in achieving the expected level of security. This year, the human factor has lost importance – less than half of enterprises indicate that they have difficulty hiring and retaining qualified employees.
-
An increase in the number of cyberattacks in 2019 was noticed by one in five companies, while only 5% of organizations noticed a decrease.
-
72% of companies are most afraid of individual hackers. In the following places were dissatisfied or poached employees indicated by 58% of organizations, and cyberterrorists and organized cybercrime groups, which are feared by 43% of respondents.
-
76% of companies use outsourcing of security functions and processes to external providers. Among them, 6 out of 10 organizations outsource more than one security function or process. The most commonly outsourced service is malware analysis.
-
Responsibility for information security in enterprises is most often unchanged with an IT department employee (director or dedicated employee).
-
The biggest risks for companies are data leaks through malware, phishing – i.e., credential phishing, and general ransomware campaigns.
-
Enterprises rate their protection against malware and internet connection security measures best. They have largely achieved maturity in terms of security in software development processes and internal network, as well as business continuity planning.
Related Terms
Learn key terms related to this article in our cybersecurity glossary:
- Ransomware — Ransomware is a type of malicious software (malware) that blocks access to a…
- Security Operations Center (SOC) — Security Operations Center (SOC) is a central location where a team of security…
- Antimalware — Antimalware is software designed to detect, prevent, and remove malicious…
- Malware — Malware, short for ‘malicious software,’ is a general term encompassing various…
- SOC as a Service — SOC as a Service (Security Operations Center as a Service), also known as…
Learn More
Explore related articles in our knowledge base:
- The Importance of Cybersecurity Training for Small and Medium Business Employees
- COVID-19 and the Change in Organizational Security Perception
- Cyberattacks - everything you need to know. A practical guide to hacking attacks
- Cybersecurity Trends in Poland 2023
- National Cybersecurity System: Protective Shield of Polish Critical Infrastructure
Explore Our Services
📚 Read the complete guide: Ransomware: Ransomware - czym jest, jak się chronić, co robić po ataku
Need cybersecurity support? Check out:
- Security Audits - comprehensive security assessment
- Penetration Testing - identify vulnerabilities in your infrastructure
- SOC as a Service - 24/7 security monitoring
