2004 Global Information Security Survey

Cyberattacks against corporations aren't under control nor will they go away soon
Cyberattacks against corporations aren't under control nor will they go away soon. CERT (Computer Emergency Response Team) reported 137,529 security incidents in 2003 while damages attributed to MyDoom, to date the fastest and most pervasive worm attack on record, have been pegged at $40 billion worldwide. What to do? Investing in cutting-edge security tools and services offers some protection against known methods of cyber attacks, but understanding what your peers are doing in terms of strategy and tactics helps you shape the best security policies and practices for your organization. InformationWeek Research provides you with in-depth data about security investments and practices in its 2004 Global Information Security Survey report.

The 13-page study documents the security practices and experiences of 7,000 sites -- spanning 40 countries -- including 3,200 U.S. companies.

Use this report to understand:

  • Which viruses and worms succeeded in breaking through security defenses last year.
  • How much downtime businesses experience after a security breach.
  • What percentage of IT budgets is earmarked for information security.
  • Which tools and practices companies are relying on to protect information systems.
  • The role that security service providers play in shoring up company defenses.

This study will help your organization build a security roadmap to guard against security intrusion as well as dollar and time losses. It also is an invaluable tool to benchmark your company's security strategies against its peers globally and in the United States.

Pages: 13

I've Bought Reports Before
Editor's Choice
Brian T. Horowitz, Contributing Reporter
Samuel Greengard, Contributing Reporter
Nathan Eddy, Freelance Writer
Brandon Taylor, Digital Editorial Program Manager
Jessica Davis, Senior Editor
Cynthia Harvey, Freelance Journalist, InformationWeek
Sara Peters, Editor-in-Chief, InformationWeek / Network Computing