{"id":49694,"date":"2023-11-21T06:33:13","date_gmt":"2023-11-21T11:33:13","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?page_id=49694"},"modified":"2023-11-27T04:16:56","modified_gmt":"2023-11-27T09:16:56","slug":"human-factor-360-report-2023","status":"publish","type":"page","link":"https:\/\/www.kaspersky.com\/blog\/human-factor-360-report-2023\/","title":{"rendered":"Redefining the Human Factor in Cybersecurity"},"content":{"rendered":"<style>.c-wysiwyg blockquote{background: rgb(0 153 129 \/ 10%);}.c-wysiwyg blockquote p{font-style:normal} .img-big { width: 100vw!important; max-width: 1024px!important; left: 53%!important; position: relative; transform: translateX(-50%); }.accent{color: #00a88e; margin: 0;font-size:1.5rem;font-weight: 900;}.c-wysiwyg .accented-list li:before {top:1.15rem}.c-wysiwyg .accented-list li{margin-bottom:1.25rem}.c-wysiwyg hr+*{margin-top:2.5rem}.c-wysiwyg hr{border-bottom: 2px solid #00a88e; width: 120px;margin: 1rem 0 -1.25rem 0;}blockquote h5 { color: #00a88e; font-style: initial; } span.accented-quote { display: block; font-size: 60px; font-family: sans-serif; line-height: 20px; margin-top: 30px; margin-left: -3px; }@media(min-width: 40.6875rem){.accent{font-size:2rem}.c-wysiwyg .accented-list li:before {top:1.75rem}.c-wysiwyg hr{border-bottom: 2px solid #00a88e; width: 160px;}}span.footnotes { position: relative; display: inline-block; border-bottom: 1.5px dashed #333; line-height: 1em;transition: 0.5s; background: transparent; cursor: pointer; } span.note { position: absolute;line-height: 1.6em; width: 300px; opacity: 0; visibility: hidden; left: 0; top: 15px; transform: translateX(-50%); transition: 0.3s; background: white; padding: 15px 20px; box-shadow: 0px 3px 7px #ababab; border-radius: 3px; cursor: initial; } span.footnotes:hover { background: #ffffd5; } span.footnotes:hover .note { z-index:999;opacity: 1; visibility: visible; }@media(max-width:480px){span.note {position: fixed;left: 5px; top: 50vh;transform: translatey(-50%); width: 100vw;}}.c-wysiwyg .illustration-list { margin-left: 0; display: grid; grid-column-gap: 5vw; grid-template-areas: \"a a\" \"b c\" \"d e\"; } @media (max-width: 640px) { .illustration-list { grid-template-areas:\"a\" \"b\" \"c\" \"d\" \"e\" }  } .c-wysiwyg .illustration-list li { margin-bottom: 2em; } .illustration-list li:before { display: none; } .illustration-list span.accent { font-size: 1em; } .illustration-list img { width: 128px; }.desktop-banner {display:block!important} .mobile-banner{display:none!important} @media(max-width:768px){.desktop-banner {display: none!important} .mobile-banner{display: block!important}}a.c-slider__arrow.c-slider__arrow--prev.slick-arrow,.c-gallery-slider .c-slider__arrow.c-slider__arrow--next, .c-gallery-slider .c-slider__arrow.c-slider__arrow--right {background:none} .c-gallery-slider .c-slider__arrow.c-slider__arrow--next:before, .c-gallery-slider .c-slider__arrow.c-slider__arrow--right:before,.c-gallery-slider .c-slider__arrow.c-slider__arrow--left:before, .c-gallery-slider .c-slider__arrow.c-slider__arrow--prev:before { filter: invert(1); transform: scale(1.25); }.slick-slider .slick-list{max-height:410px!important}.c-article__content blockquote li, .c-article__content blockquote p { font-size: 1rem; }<\/style>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49686\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124556\/human-factor-360-report-2023-featured.jpg\" alt=\"\" width=\"1460\" height=\"905\"><\/p>\n<h2>Introduction<\/h2>\n<hr>\n<p>The concept of the \u2018human factor\u2019 in cybersecurity needs to be looked at and understood with new eyes. To this end, Kaspersky proposes a 360<strong>\u00b0 <\/strong>Human Factor model where all relevant staff are included in the cybersecurity conversation.<\/p>\n<p>In the past two years alone, more than three-quarters (77%) of companies experienced at least one cybersecurity breach, with many enduring up to six in that period. What companies attribute these incidents to differ, however \u2013 and so does their response. For some, investing in new automation tools is a priority. For others, hiring new IT staff is the way forward. Others are looking to outsource their security.<\/p>\n<p>Education is also part of this strategic mix, but perhaps not to the extent it should be, especially considering that 64% of all cyber incidents in the past two years were caused by human error.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-49680\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124450\/human-factor-360-report-2023-1.png\" alt=\"Redefining the Human Factor in Cybersecurity\" width=\"1200\" height=\"800\"><\/p>\n<p>To get a better understanding of the dynamic of <em>threat versus response<\/em>, we conducted our 2023 Human Factor survey, to give us a clearer view of the cybersecurity ecosystem through the human lens. This included non-IT employees, IT staff and decision-makers operating within an organization. They, in turn, discussed and analyzed their relationships with vendors and outsource partners. As a result, we have gained a 360-degree view of the \u2018human factor\u2019.<\/p>\n<p>In this report, we have focused on how these various demographics combine to provide an overall threat surface that organizations across numerous sectors and regions are facing. We have looked at the influence of each group, and at how organizations are currently perceiving and handling the threat landscape. We have analyzed the current levels of investment being injected into cybersecurity, and where decision-makers feel greater improvements are needed in the future \u2013 are they investing in people, or is automation seen as the best way to sidestep both human frailty and human threat?<\/p>\n<p>We have sought to show the level of security that is needed to ensure resilience and preparedness, despite human involvement from <em>all sides<\/em>, in <em>all ways<\/em>, at <em>all times<\/em>.<\/p>\n<h2>Methodology<\/h2>\n<hr>\n<p>Arlington Research conducted 1,260 interviews with IT &amp; IT security engineers. The survey covered 19 countries: Brazil, Chile, China, Colombia, France, Germany, India, Indonesia, Japan, Kazakhstan, Mexico, Russia, Saudi Arabia, South Africa, Spain, Turkey, UAE, UK and USA. All respondents were at Manager+ level working for SMEs with 100+ employees, or Enterprises with more than 1,000 employees.<\/p>\n<h2>Key findings<\/h2>\n<hr>\n<ul class=\"accented-list\">\n<li><span class=\"accent\">77%<\/span> of companies experienced at least one cyber incident in the past two years.<\/li>\n<li><span class=\"accent\">75%<\/span> report that the cybersecurity incidents experienced by their company during this period were serious.<\/li>\n<li><span class=\"accent\">26%<\/span> of all cyber incidents in the past two years were caused by employees\u2019 intentional information security policies violations. These internal actions reflect almost the same level of danger to business security as hacking, which 30% of respondents reported.<\/li>\n<li><span class=\"accent\">14%<\/span> of cyber incidents are due to senior IT security staff errors, compounded by a further 15% of errors being caused by other IT staff.<\/li>\n<li><span class=\"accent\">18%<\/span> of respondents report that a skills shortage in cybersecurity is the cause of incidents in their companies. This is reflected in an overall concern where 75% of companies regard the shortage of skilled staff as a serious problem.<\/li>\n<li><span class=\"accent\">41%<\/span> of companies feel they have gaps in their cybersecurity infrastructures plan to increase investments in this area moving forward.<\/li>\n<li><span class=\"accent\">21%<\/span> of respondents say they do not have the budget to take adequate cybersecurity measures, while 28% believe they have what they need to stay ahead of potential threats.<\/li>\n<\/ul>\n<h2>Industry breakdown<\/h2>\n<hr>\n<table>\n<tbody>\n<tr>\n<td style=\"min-width: 60px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-49687\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124605\/human-factor-360-report-2023-icon-1.png\" alt=\"\" width=\"260\" height=\"260\"><\/td>\n<td>\n<h3>Financial Services: vulnerable to information security policies violations<\/h3>\n<p>Compared to a global average of just 8%, the extent of incidents caused by information security policies violations by non-IT employees sits at an alarming 22%. This is compounded by 34% reporting that intentionally malicious behavior is a significantly more common issue in financial services.<\/p><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" class=\"aligncenter size-full wp-image-49688\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124610\/human-factor-360-report-2023-icon-2.png\" alt=\"\" width=\"260\" height=\"260\"><\/td>\n<td>\n<h3>Telecommunications: a sector with much to learn<\/h3>\n<p>More than one-third (34%) of companies in the telecommunications sector have experienced more than four cyber breaches in the past two years. This is higher than in any other industry \u2013 an industry where 66% of employees are under the age of 35, and who you would expect to be more tech-savvy.<\/p><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" class=\"aligncenter size-full wp-image-49689\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124616\/human-factor-360-report-2023-icon-3.png\" alt=\"\" width=\"260\" height=\"260\"><\/td>\n<td>\n<h3>Information Technology: IT staff lose sight of their non-IT colleagues<\/h3>\n<p>IT is another industry with 54% of employees under the age of 35. However, they experience more issues with human error among non-IT staff than any other industry (23%). The main concern here is that, even in an IT setting, the visibility of non-IT workers can be lost or ignored. This serves as a reminder that cyber capability and understanding is a company-wide concern.<\/p><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" class=\"aligncenter size-full wp-image-49690\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124620\/human-factor-360-report-2023-icon-4.png\" alt=\"\" width=\"260\" height=\"260\"><\/td>\n<td>\n<h3>Retail: a sector under serious threat, heads to the cloud<\/h3>\n<p>While retail didn\u2019t experience the most frequent extent of breaches over the past two years, it did suffer the most serious outcomes. More than half (52%) confirmed the incidents they experienced were either very serious, or extremely serious. A priority for this sector, as a result, is to implement SaaS cloud solutions (37%, the highest of any industry).<\/p><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" class=\"aligncenter size-full wp-image-49691\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124625\/human-factor-360-report-2023-icon-5.png\" alt=\"\" width=\"260\" height=\"260\"><\/td>\n<td>\n<h3>Manufacturing: an investment drive to close consistent gaps<\/h3>\n<p>Manufacturing companies (37%), more than any other sector, reported that they have endured between two and three cyber incidents over the past two years. This consistent and troubling statistic explains why it is also one of the leading sectors targeting investments to close cybersecurity gaps (50%).<\/p><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" class=\"aligncenter size-full wp-image-49692\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124630\/human-factor-360-report-2023-icon-6.png\" alt=\"\" width=\"260\" height=\"260\"><\/td>\n<td>\n<h3>Critical infrastructure: skills shortages and information security policies violations<\/h3>\n<p>The impact of skills shortages came through most prominently in the industrial realms of critical infrastructure, energy and oil &amp; gas (24%). Often criticized in the past for its lack of innovation, it seems that cybersecurity skills shortages are still an issue \u2013 an issue compounded by 33% (a sector high) of workers reporting incidents of intentional information security policies violations among non-IT staff.<\/p><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" class=\"aligncenter size-full wp-image-49693\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124635\/human-factor-360-report-2023-icon-7.png\" alt=\"\" width=\"260\" height=\"260\"><\/td>\n<td>\n<h3>Transport &amp; Logistics: accidents happen all too frequently<\/h3>\n<p>Unintentional human error was a common risk on a global scale, even surpassing the threat of hacking. However, it was most severe in transport &amp; logistics, where 49% reported the link between accidental human error from both inside and outside the IT department, and a cybersecurity breach in the past two years. It is no surprise that the sector is highly motivated to invest in closing existing cybersecurity gaps (51%).<\/p><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Setting the cybersecurity scene<\/h2>\n<hr>\n<p>Over the past two years, most companies around the world experienced one or more cyber incidents. As many as 77% confirmed that despite growing calls for greater cyber hygiene and more resilient security processes and technologies, breaches are still very common.<\/p>\n<h5 style=\"text-align: center;\">Has your company experienced any breaches of cybersecurity within the last two years? In the last two years, we have had\u2026<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49772\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031108\/human-factor-360-report-2023-graph-1.jpg\" alt=\"\" width=\"1434\" height=\"474\"><\/p>\n<p>In some regions, this statistic is even more concerning. In North America for example, only 15% have not experienced any type of cyber incident over the past 24 months. Almost one-quarter (22%) endured more than six incidents in the past two years alone. The CIS region also reported a higher likelihood of numerous incidents (17% with more than six breaches), suggesting that those who are initially vulnerable struggle to find a suitable defense or solution quickly. APAC and META regions report similar numbers, each experiencing 11% of incidents over the past two years there.<\/p>\n<h5 style=\"text-align: center;\">Has your company experienced any breaches of cybersecurity within the last two years? In the last two years, we have had\u2026<\/h5>\n<div class=\"c-gallery-slider js-gallery-slider\"><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031207\/human-factor-360-report-2023-graph-2-5.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031207\/human-factor-360-report-2023-graph-2-5-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-2 (5)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031154\/human-factor-360-report-2023-graph-2-4.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031154\/human-factor-360-report-2023-graph-2-4-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-2 (4)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031142\/human-factor-360-report-2023-graph-2-3.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031142\/human-factor-360-report-2023-graph-2-3-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-2 (3)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031131\/human-factor-360-report-2023-graph-2-2.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031131\/human-factor-360-report-2023-graph-2-2-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-2 (2)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031120\/human-factor-360-report-2023-graph-2-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031120\/human-factor-360-report-2023-graph-2-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-2 (1)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031219\/human-factor-360-report-2023-graph-2-6.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031219\/human-factor-360-report-2023-graph-2-6-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-2 (6)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><\/div>\n<div class=\"wp-caption\">\n<p class=\"wp-caption-text\" style=\"text-align: center;\">Use slider to view inf\u043ermation for other regions<\/p>\n<\/div>\n<p>The seriousness of these cyber incidents also varies. When asked about the level of severity, 75% of respondents globally confirmed that the breaches experienced by their company were \u2018serious\u2019 or worse. Within this group, one-quarter went as far as saying the incident was \u2018very serious\u2019 and 13% confirmed it was \u2018extremely serious\u2019.<\/p>\n<p>\u2018Seriousness\u2019 in this context related to confidential data being leaked, with negative impacts on reputation, customer trust and on the business\u2019s financial standing. It is worrying, therefore, that in North America once again, 88% experienced a serious (or worse) incident creating those negative outcomes, in the past two years.<\/p>\n<h5 style=\"text-align: center;\">How serious was those cyber incidents for your company<\/h5>\n<div class=\"c-gallery-slider js-gallery-slider\"><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031305\/human-factor-360-report-2023-graph-3-4.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031305\/human-factor-360-report-2023-graph-3-4-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-3 (4)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031252\/human-factor-360-report-2023-graph-3-3.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031252\/human-factor-360-report-2023-graph-3-3-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-3 (3)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031241\/human-factor-360-report-2023-graph-3-2.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031241\/human-factor-360-report-2023-graph-3-2-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-3 (2)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052038\/human-factor-360-report-2023-graph-3-5-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052038\/human-factor-360-report-2023-graph-3-5-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-3 (5)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031330\/human-factor-360-report-2023-graph-3-6.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031330\/human-factor-360-report-2023-graph-3-6-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-3 (6)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031230\/human-factor-360-report-2023-graph-3-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031230\/human-factor-360-report-2023-graph-3-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-3 (1)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><\/div>\n<div class=\"wp-caption\">\n<p class=\"wp-caption-text\" style=\"text-align: center;\">Use slider to view inf\u043ermation for other regions<\/p>\n<\/div>\n<p>While the global picture shows that incidents are still incredibly frequent, and often serious, the extent of concern differs from region to region. In Latin America (38%), CIS (35%) and Europe (31%), the extent of non-serious incidents is more reassuring. However, APAC (87%) and META (83%) show figures much higher than the global average.<\/p>\n<p>The overall picture of cybersecurity over the past two years is one of regular and often serious breaches. This situation is most pronounced in North America, APAC and META, but no other region has been fully immune. For example, despite the lowest figure in Europe among all the regions, the UK and Spain report high severity of cyber incidents they\u2019ve experienced. 88% of cyber breaches in the UK and 70% in Spain were claimed to be serious to different extent. At the same time, LatAm\u2019s Chile rates 90% of cyber incidents as serious and very serious. All corners of the world report a majority who have not only experienced incidents, but serious ones. It is now time to find out where these organizations believe the gaps in their defenses are.<\/p>\n<h2>Non-IT: the human \u2013 error \u2013 factor<\/h2>\n<hr>\n<p>Like all staff members, especially in the modern, flexible working climate, non-IT professionals use different devices. This might involve a combination of a desktop in the workplace and a laptop when working remotely and includes access credentials from these devices and sharing confidential data within the company. As non-IT professionals, there is an expectation that these staff would be more likely to make errors that lead to cyber incidents. But are they really the most common source of danger for cybersecurity within an organization?<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-49681\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124504\/human-factor-360-report-2023-2.png\" alt=\"Redefining the Human Factor in Cybersecurity\" width=\"1200\" height=\"800\"><\/p>\n<p>Indeed, at first glance, it is accidental human error (38%) that accounted for more incidents than any other factor over the past two years. However, when analyzing the full rundown of error types, the human factor of breaches appears in different ways. Most common is the download of malware (28%), although almost every possible cause received more than 20% of selections. Using weak passwords or not changing passwords often enough (25%), visiting unsecured websites (24%) and using unauthorized systems to share data (24%) are among the next most common \u2018human errors\u2019.<\/p>\n<h5 style=\"text-align: center;\">What did employees do to cause the incident?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49785\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031342\/human-factor-360-report-2023-graph-4.jpg\" alt=\"\" width=\"1434\" height=\"846\"><\/p>\n<p>The complete list of causes behind cyber incidents further highlights the volume of factors an employee \u2013 especially one outside of the IT function \u2013 must consider reducing the likelihood of a mistake. For example, the deployment of shadow IT (11%) is a growing concern among organizations as employees spend more and more time outside the office and must be trusted with remote devices (both work and personal).<\/p>\n<p>It should be noted that these causes are more likely to be accidental than deliberate. Only 8% of incidents were caused by an information security policies violation by non-IT employee. However, the financial services sector is an anomaly in this regard. Information security policies violations by non-IT staff in this industry are responsible for 22% of cyber incidents, while 34% reported intentionally malicious behavior by both IT and non-IT employees as a significantly more common issue.<\/p>\n<h5 style=\"text-align: center;\">What were the consequences of an incident for your company?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49786\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031354\/human-factor-360-report-2023-graph-5.jpg\" alt=\"\" width=\"1434\" height=\"721\"><\/p>\n<p>Regardless of whether it is accidental human error or an information security policies violation, the consequences can be severe. In one-third of cases, a confidential data leak occurred, implicating employees but also customers who are unlikely to be loyal to a business from then on. Indeed, 25% took a reputational hit following the breach, and 24% confirmed a loss of customer trust. Financial penalties (22%) were also common. And, considering all the above, it is perhaps unsurprising that in 18% of cases, the breach led to a staff member being sacked.<\/p>\n<h5 style=\"text-align: center;\">What were the consequences of an incident for the employee?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49787\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031406\/human-factor-360-report-2023-graph-6.jpg\" alt=\"\" width=\"1434\" height=\"660\"><\/p>\n<p>When looking through the lens of the employee, being dismissed was the outcome on 23% of occasions. A reprimand from senior management (31%), subsequent supervision (31%), payments of penalties (26%) and demotions (25%) were all relatively common. However, additional training (36%) was the most frequent \u2018punishment\u2019.<\/p>\n<blockquote>\n<h4>Kaspersky recommends<\/h4>\n<ul>\n<li>As endpoints and their users are the primary targets for most attackers, companies must approach their protection with utter diligence and consider additional hardening options. <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kesbc___\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> and <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/cloud?icid=gl_human-factor_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kescloud___\" rel=\"noopener nofollow\">Kaspersky Endpoint Security Cloud<\/a> offer Application, Web and Device controls which limit the use of unsolicited apps, websites and peripherals, significantly reducing infection risks even in cases where employees use shadow IT or make mistakes due lack of cybersafe habits.<\/li>\n<li>Implement cybersecurity products with hardening options like Vulnerability &amp; Patch Management, which helps keep systems free from system and application vulnerabilities. Advanced Anomaly Control within <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/endpoint-advanced?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kesba___\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business Advanced<\/a>, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/total?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___ktsb___\" rel=\"noopener nofollow\">Kaspersky Total Security for Business<\/a> and <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/edr-security-software-solution?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kedr___\" rel=\"noopener nofollow\">Kaspersky Endpoint Detection and Response Optimum<\/a> helps prevent potentially dangerous \u2018out of the norm\u2019 activities, both by a user or initiated by an attacker who has already taken control over the system.<\/li>\n<li>Use solutions with anti-phishing protection. Anti-phishing functionality of <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___ksms___\" rel=\"noopener nofollow\">Kaspersky Security for Mail Server<\/a> and <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/internet-gateway?icid=gl_human-factor_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___ksig___\" rel=\"noopener nofollow\">Kaspersky Security for Internet Gateway<\/a> can detect and block socially engineered lures (including those with malware, phishing links or, in some cases, purely logical Business Email Compromise examples) before they reach the user. At the same time, the Web Antivirus in the latter removes the contact point from the employee, further reducing risks of threats affecting endpoints and their users.<\/li>\n<li>Unwitting and unrestricted transfers of data in or out of the system also bring risks. Kaspersky Endpoint Security Cloud, Kaspersky Security for Mail Server and <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/microsoft-office-365-security?icid=gl_human-factor_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___ksmo___\" rel=\"noopener nofollow\">Kaspersky Security for Microsoft Office 365<\/a> solve this issue with data discovery and content filtering functionality. Kaspersky Security for Internet Gateway also offers content filtering, which can prevent unsolicited data transmissions regardless of their nature, platform protection state or user behavior on the endpoints inside the network.<\/li>\n<li>To boost security awareness among employees, educate them with <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/security-awareness-platform?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kasap___\" rel=\"noopener nofollow\">Kaspersky Automated Security Awareness Platform<\/a> training that teaches safe internet behavior and includes a simulated phishing attack exercise so they know how to recognize phishing emails and other socially engineered lures.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>IT professionals: skills shortages cause security shortfalls closer to home<\/h2>\n<hr>\n<p>The above statistics exploring the role of non-IT professionals suggest that they have a big impact on security breaches. But are they the only ones? Let\u2019s look at the other part of the human factor \u2013 IT and IT security professionals. Contrary to assumptions, the responses to this survey suggest that IT and IT security professionals are not above causing cyber incidents.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-49682\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124518\/human-factor-360-report-2023-3.png\" alt=\"Redefining the Human Factor in Cybersecurity\" width=\"1200\" height=\"800\"><\/p>\n<p>Senior IT security professionals were responsible for 14% of cyber incidents through unintentional human error over the past two years. Other IT staff within the organization contributed to 15% of incidents, and this is before you consider deliberate violations. While they are again quite low in general terms, more than 12% of incidents are caused by information security policies violations by IT staff. In 11% of cases, such acts come from senior IT security workers.<\/p>\n<table>\n<tbody>\n<tr>\n<td><\/td>\n<td><strong>Senior IT security professionals<\/strong><\/td>\n<td><strong>Other IT staff<\/strong><\/td>\n<td><strong>Non-IT workers<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Unintentional human error<\/strong><\/td>\n<td><strong>14%<\/strong><\/td>\n<td><strong>15%<\/strong><\/td>\n<td><strong>16%<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Intentional information security policies violations<\/strong><\/td>\n<td><strong>11%<\/strong><\/td>\n<td><strong>12%<\/strong><\/td>\n<td><strong>8%<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Comparing the impact of IT and non-IT professionals on cybersecurity, there is very little difference, and when combining instances of both accidental and deliberate actions, IT workers are shown to be more of a risk than non-IT staff.<\/p>\n<p>However, it is the statistic between them that a lot of organizations are focusing on. A skills shortage (18%) is given the same level of impact as hackers installing trojans (18%), once again emphasizing the human factor, especially within the confines of the company.<\/p>\n<h5 style=\"text-align: center;\">What is the impact of skilled staff shortage in the area of cybersecurity for your company?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49788\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031418\/human-factor-360-report-2023-graph-7.jpg\" alt=\"\" width=\"1434\" height=\"411\"><\/p>\n<p>Three-quarters of organizations around the world see cybersecurity skills shortages as a serious issue, to varying degrees. Almost one-quarter (24%) say the issue is \u2018very serious\u2019. In the APAC region, this number rises to 87%, while META is not far behind (85%). In both regions, almost one-quarter (APAC \u2013 24%; META \u2013 22%) view the issue as extremely serious.<\/p>\n<p>The answer for many, as documented earlier, is additional training \u2013 a plan of action taken up by 36% of respondents following a breach. Looking to the future, the provision of additional training for IT staff is set to be a strategy for 37% of organizations \u2013 more than any other tactic to prevent future cybersecurity breaches.<\/p>\n<h5 style=\"text-align: center;\">Looking to the future, what will be most important in preventing future cybersecurity breaches?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49789\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031431\/human-factor-360-report-2023-graph-8.jpg\" alt=\"\" width=\"1434\" height=\"784\"><\/p>\n<p>However, when asked directly about investments, while hiring additional IT professionals (35%) and training for all employees (38%) were on the agenda; outsourcing (41%) outweighed both individual plans.<\/p>\n<h5 style=\"text-align: center;\">Where is your company most likely to make investments in cybersecurity in the next 12 to 18 months?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49790\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031443\/human-factor-360-report-2023-graph-9.jpg\" alt=\"\" width=\"1434\" height=\"660\"><\/p>\n<p>Among this sample, almost one-quarter (23%) is targeting outsourcing of cybersecurity to a managed service provider (MSP) or managed security service provider (MSSP). Outsourcing is a more common strategy in APAC (57%), although this is included alongside education initiatives (71%) for a balanced plan. In all regions, the order of priorities for future investment reads:<\/p>\n<ol>\n<li>Tools<\/li>\n<li>Education<\/li>\n<li>Outsourcing<\/li>\n<\/ol>\n<p>But only in Latin America does the idea of outsourcing IT functions drop below 30%, and for Europe, CIS, APAC and META regions, it is a preferable option to hiring additional IT professionals.<\/p>\n<h5 style=\"text-align: center;\">Where is your company most likely to make investments in cybersecurity in the next 12 to 18 months?<\/h5>\n<div class=\"c-gallery-slider js-gallery-slider\"><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031553\/human-factor-360-report-2023-graph-10-6.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031553\/human-factor-360-report-2023-graph-10-6-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-10 (6)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031542\/human-factor-360-report-2023-graph-10-5.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031542\/human-factor-360-report-2023-graph-10-5-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-10 (5)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031531\/human-factor-360-report-2023-graph-10-4.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031531\/human-factor-360-report-2023-graph-10-4-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-10 (4)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031519\/human-factor-360-report-2023-graph-10-3.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031519\/human-factor-360-report-2023-graph-10-3-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-10 (3)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031507\/human-factor-360-report-2023-graph-10-2.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031507\/human-factor-360-report-2023-graph-10-2-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-10 (2)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031455\/human-factor-360-report-2023-graph-10-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031455\/human-factor-360-report-2023-graph-10-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-10 (1)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><\/div>\n<div class=\"wp-caption\">\n<p class=\"wp-caption-text\" style=\"text-align: center;\">Use slider to view inf\u043ermation for other regions<\/p>\n<\/div>\n<blockquote>\n<h4>Kaspersky recommends<\/h4>\n<ul>\n<li>For SMBs that lack the budget for cybersecurity products and hiring dedicated IT security professionals, only one IT administrator is needed to manage <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/cloud?icid=gl_human-factor_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kescloud___\" rel=\"noopener nofollow\">Kaspersky Endpoint Security Cloud<\/a> easily through the console with numerous automated scenarios.<\/li>\n<li>Implement products that allow administrator rights to be limited to options that they really need in their work. <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kesbc___\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> offers role-based access to Kaspersky Security Center management console items, so not all administrators require full control over security functions.<\/li>\n<li>Invest in training so your IT security specialists\u2019 skills are always up-to-date and equipped to handle anything the cyberthreat landscape throws at your organization. <a target=\"_blank\" href=\"https:\/\/academy.kaspersky.com\/courses\/cito-cybersecurity-for-it-online\/?icid=gl_human-factor-k-ac_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team______\" rel=\"noopener\">Kaspersky Cybersecurity for IT Online<\/a> training helps build up simple yet effective IT security-related best practices and simple incident response scenarios for generalist IT admins, while <a target=\"_blank\" href=\"https:\/\/xtraining.kaspersky.com\/?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___xtraining___\" rel=\"noopener\">Kaspersky Expert Training<\/a> equips your security team with the latest knowledge and skills in threat management and mitigation to defend your organization against even the most sophisticated attacks.<\/li>\n<li>Implementing <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/professional-services?icid=gl_human-factor_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kprofs___\" rel=\"noopener nofollow\">Kaspersky Professional Services<\/a> optimizes the workload of your heavily challenged IT department. Kaspersky experts assess the state of your current IT security, then deploy and configure Kaspersky software quickly and properly to ensure hassle-free ongoing performance. And <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/premium-support?icid=gl_human-factor_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kpsup___\" rel=\"noopener nofollow\">Kaspersky Premium Support<\/a> speeds up and boosts the efficiency of any Kaspersky-based IT security infrastructure.<\/li>\n<li>Make use of the expertise offered by managed security offerings. For example, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kmdr___\" rel=\"noopener nofollow\">Kaspersky Managed Detection &amp; Response<\/a> raises the overall protection level of an organization by 24\/7 monitoring of telemetry coming from company\u2019s IT network, and also, helps develop in-house processes and best practices while following the incident response guidelines provided by Kaspersky experts.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>Decision time: where are the gaps and what is my budget?<\/h2>\n<hr>\n<p>Just as with IT professionals, decision-makers have not been immune from responsibility when it comes to cyber incidents over the past two years. But do they feel they are being equipped well enough? The decisions they have made come from a situation where 18% of respondents believe incidents were caused by a lack of necessary tools for threat detection, and 16% lack focus on threat prevention more generally. It is interesting that 15% claim that insufficient investments into cybersecurity is also a problem in their company. Are decision-makers not focusing on the right strategies, or do they not needed to improve cybersecurity levels?<\/p>\n<h5 style=\"text-align: center;\">How well do you feel your company is protected against cybersecurity breaches?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49797\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031603\/human-factor-360-report-2023-graph-11.jpg\" alt=\"\" width=\"1434\" height=\"411\"><\/p>\n<p>While the vast majority believe they are protected, only half (49%) say they feel \u2018very well protected\u2019 or better. Perhaps more concerning is that 12% don\u2019t feel well protected, or not at all protected. This group is entering a situation where they may even anticipate a daily breach or cyber incident.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-49683 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124530\/human-factor-360-report-2023-4.png\" alt=\"Redefining the Human Factor in Cybersecurity\" width=\"1200\" height=\"800\"><\/p>\n<p>The situation in CIS countries is slightly more alarming, with 19% (almost one in five) believing their organizations are not well \u2013 or not at all \u2013 protected. Europe (15%) also increases the global average in this respect.<\/p>\n<p>Comparatively, North America (27%), APAC (22%) and the META (19%) all score above the global average in working for companies they believe are \u2018extremely well protected\u2019. This is interesting given that each of these regions were also vocal in terms of their shortcomings. In North America especially, they reported the highest number of serious incidents over the past two years, despite believing their protection levels are high. APAC\u2019s confidence in protection levels, meanwhile, is despite citing skills shortages as a serious issue.<\/p>\n<h5 style=\"text-align: center;\">How well do you feel your company is protected against cybersecurity breaches?<\/h5>\n<div class=\"c-gallery-slider js-gallery-slider\"><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052111\/human-factor-360-report-2023-graph-12-2-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052111\/human-factor-360-report-2023-graph-12-2-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-12 (2)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031704\/human-factor-360-report-2023-graph-12-5.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031704\/human-factor-360-report-2023-graph-12-5-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-12 (5)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031651\/human-factor-360-report-2023-graph-12-4.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031651\/human-factor-360-report-2023-graph-12-4-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-12 (4)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052123\/human-factor-360-report-2023-graph-12-5-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052123\/human-factor-360-report-2023-graph-12-5-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-12 (5)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052135\/human-factor-360-report-2023-graph-12-6-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052135\/human-factor-360-report-2023-graph-12-6-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-12 (6)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052056\/human-factor-360-report-2023-graph-12-1-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052056\/human-factor-360-report-2023-graph-12-1-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-12 (1)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><\/div>\n<div class=\"wp-caption\">\n<p class=\"wp-caption-text\" style=\"text-align: center;\">Use slider to view inf\u043ermation for other regions<\/p>\n<\/div>\n<p>These kinds of conflicting statistics could illustrate the lack of clear visibility that decision-makers also have at present, where a general feeling of protection doesn\u2019t necessarily correlate with the level of incidents that are occurring.<\/p>\n<p>It might also stem from perceptions of investments so far. Half believe that the budget for cybersecurity measures within their company covers simply what they need to keep up with new and potential threats.<\/p>\n<h5 style=\"text-align: center;\">Would you say the budget for cybersecurity in your company\u2026?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49804\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031727\/human-factor-360-report-2023-graph-13.jpg\" alt=\"\" width=\"1434\" height=\"411\"><\/p>\n<p>However, more than one-quarter (28%) believe they can stay ahead of the curve. This supports the idea that most believe they are at least protected for the time being, even if the extent of breaches suggests otherwise. For one in five companies (18%), the budget accessible to decision-makers falls short of what they need to keep up with new and potential threats, while for 3% there simply is no budget.<\/p>\n<blockquote>\n<h4>Kaspersky recommends\u2026<\/h4>\n<ul>\n<li>To advance decision-makers\u2019 understanding of the importance of cybersecurity and how best to distribute budgets to stay ahead of threats, engage them with <a target=\"_blank\" href=\"https:\/\/go.kaspersky.com\/interactive-protection-simulation?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kips___\" rel=\"noopener nofollow\">Kaspersky Interactive Protection Simulation<\/a> for enhanced C-level professional education.<\/li>\n<li>Consider experts\u2019 help. For example, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/professional-services?icid=gl_human-factor_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kprofs___\" rel=\"noopener nofollow\">Kaspersky Assessments family of professional services<\/a> identifies security gaps in your system\u2019s configuration, and the Security Architecture Design helps create an IT security infrastructure that\u2019s a perfect fit for a particular company. Every step of implementation is grounded in real security needs, giving decision-makers convincing arguments to allocate budgets.<\/li>\n<li>Use easy-manageable solutions. <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/cloud?icid=gl_human-factor_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team___kescloud___\" rel=\"noopener nofollow\">Kaspersky Endpoint Security Cloud<\/a> is for smaller enterprises or companies that don\u2019t currently have the budget for a wide stack of cybersecurity products. The all-in-one hosted SaaS console allows just a single administrator to manage a broad range of cybersecurity tasks from one place, with a simple and easy-to-master workflow.<\/li>\n<li>Refer to Kaspersky\u2019s \u2018<a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/budget-cybersecurity\/?icid=gl_human-factor-2023_acq_ona_smm__onl_b2b_kdaily_lnk_sm-team______\" rel=\"noopener nofollow\">Cybersecurity on a budget<\/a>\u2018 resource for small and medium businesses for tips on how to spend less on IT without compromising on security.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>Finding a fitting solution: attention turns to tech<\/h2>\n<hr>\n<p>In line with the above responses around budget capabilities, it is important to see where companies are planning to target their investments in cybersecurity in the next 12-18 months. As discussed, education and outsourcing are high on the agenda for many, but neither outweigh the focus on new tools and technology. Software for threat detection was the most common answer at 40%, just ahead of specific training for cybersecurity professionals (39%) and education for employees generally (38%). In total, tools (71%) are by far the priority for investment, with this number rising to 76% in Latin America where outsourcing (28%) is a less-considered strategy; and in APAC (78%) where all solutions still seem to be on the table.<\/p>\n<h5 style=\"text-align: center;\">What do you need to close cybersecurity skill &amp; tool gaps?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49805\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031738\/human-factor-360-report-2023-graph-14.jpg\" alt=\"\" width=\"1434\" height=\"660\"><\/p>\n<p>This focus on tools and new software is confirmed when respondents are asked about the best way to plug gaps in their cybersecurity defenses. By far the most common answer was general cybersecurity investment increases (41%), compounded by the specific aim of purchasing more tools (software) which one-third agreed with.<\/p>\n<h5 style=\"text-align: center;\">Is your company considering the implementation of software tools that automatically manage parts of your cybersecurity?<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49806\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031749\/human-factor-360-report-2023-graph-15.jpg\" alt=\"\" width=\"1434\" height=\"474\"><\/p>\n<p>One-quarter of respondents work for companies with automation tools already in place, while almost double that number (45%) have concrete plans to introduce these in the next 12 months. Only 9% have either rejected the idea or not considered automation yet.<\/p>\n<p>North America (32%), LatAm (28%) and APAC (27%) have the highest volume of automation tools already in place, which might explain their strong confidence around current protection levels. However, North America also has the second highest proportion of those who have only discussed the possibility. This suggests that most have either already done it, or don\u2019t plan to do it any time soon. In all other regions, the most common response was a middle ground where they plan to introduce automation tools in the next 12 months.<\/p>\n<h5 style=\"text-align: center;\">Is your company considering the implementation of software tools that automatically manage parts of your cybersecurity?<\/h5>\n<div class=\"c-gallery-slider js-gallery-slider\"><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052148\/human-factor-360-report-2023-graph-16-2-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052148\/human-factor-360-report-2023-graph-16-2-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-16 (2)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031853\/human-factor-360-report-2023-graph-16-5.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031853\/human-factor-360-report-2023-graph-16-5-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-16 (5)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031838\/human-factor-360-report-2023-graph-16-4.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031838\/human-factor-360-report-2023-graph-16-4-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-16 (4)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031825\/human-factor-360-report-2023-graph-16-3.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031825\/human-factor-360-report-2023-graph-16-3-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-16 (3)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031813\/human-factor-360-report-2023-graph-16-2.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031813\/human-factor-360-report-2023-graph-16-2-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-16 (2)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031801\/human-factor-360-report-2023-graph-16-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031801\/human-factor-360-report-2023-graph-16-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-16 (1)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><\/div>\n<div class=\"wp-caption\">\n<p class=\"wp-caption-text\" style=\"text-align: center;\">Use slider to view inf\u043ermation for other regions<\/p>\n<\/div>\n<h5 style=\"text-align: center;\">Automation tools will reduce the cybersecurity risk posed by human error\u2026<\/h5>\n<p><img decoding=\"async\" class=\"img-big aligncenter size-full wp-image-49813\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22031917\/human-factor-360-report-2023-graph-17.jpg\" alt=\"\" width=\"1434\" height=\"411\"><\/p>\n<p>Only 9% don\u2019t believe automation tools will have a positive impact on reducing risks associated with human error, with far more (59%) believing the risk will be reduced significantly (if not to almost zero).<\/p>\n<p>Again, North America\u2019s polarized response to automation comes through, with one of the highest proportions who believe risk would be eliminated (12%), alongside 11% who think it would have no significant impact at all. Latin America and APAC have the most confidence in the role of automation tools, with only 7% in each case believing there would be no significant impact to risk from its introduction. In turn, despite a high level of doubt about the full effectiveness of automation in META, they also show the highest level of confidence that automation will reduce risks of human error to almost zero (14%).<\/p>\n<h5 style=\"text-align: center;\">Automation tools will reduce the cybersecurity risk posed by human error\u2026<\/h5>\n<div class=\"c-gallery-slider js-gallery-slider\"><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22051925\/human-factor-360-report-2023-graph-18-1-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22051925\/human-factor-360-report-2023-graph-18-1-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-18 (1)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22051937\/human-factor-360-report-2023-graph-18-2-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22051937\/human-factor-360-report-2023-graph-18-2-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-18 (2)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22051949\/human-factor-360-report-2023-graph-18-3-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22051949\/human-factor-360-report-2023-graph-18-3-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-18 (3)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052001\/human-factor-360-report-2023-graph-18-4-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052001\/human-factor-360-report-2023-graph-18-4-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-18 (4)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052015\/human-factor-360-report-2023-graph-18-5-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22052015\/human-factor-360-report-2023-graph-18-5-1-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-18 (5)\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22054023\/human-factor-360-report-2023-graph-18-6-2.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22054023\/human-factor-360-report-2023-graph-18-6-2-700x427.jpg\" alt=\"\" title=\"human-factor-360-report-2023-graph-18-6\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><\/div>\n<div class=\"wp-caption\">\n<p class=\"wp-caption-text\" style=\"text-align: center;\">Use slider to view inf\u043ermation for other regions<\/p>\n<\/div>\n<p>Automation is the flavor of the month, year and possibly the future, too. But companies must proceed with caution.<\/p>\n<h2>A revised approach to cybersecurity and the human factor<\/h2>\n<hr>\n<p>Across the board, automation has clearly been identified as a vital tool to enhance cybersecurity levels and protect companies more effectively. In most cases, the conversation around automation has already happened, and for many, implementation has begun. In some regions, investment in automation has led to strong confidence around general cybersecurity protection.<\/p>\n<p>However, the general volume of incidents that are still occurring around the world suggest that this confidence should be tempered slightly. It is easy to forget where the risk is coming from when investments are being made in new technologies, but automation doesn\u2019t remove humans from the work process. And it is humans who have been shown to create the biggest risk to cyber defenses, no matter the size of the company.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-49685\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/20124543\/human-factor-360-report-2023-5.png\" alt=\"Redefining the Human Factor in Cybersecurity\" width=\"1200\" height=\"800\"><\/p>\n<p>This is why automation must dovetail with ongoing education of both non-IT staff and IT professionals. It must be part of an investment plan that also embraces software that protects endpoints, that safeguards internet and mail gateways, and that provides direct professional consultative services. It must form part of an overall matrix where prevention, detection and response interlink as an ecosystem of solutions. And, most importantly, it must bring both non-IT and IT staff along with them through every investment.<\/p>\n<p>Tools to help safeguard against human error are a vital step forward, but they can\u2019t exclude employee education and skills development. After all, the threats that lurk outside company walls are also human-based \u2013 hackers continuously seeking to outrun the pace of innovation and exploit not only software, but fallible staff members as well. This is why the whole human factor must be considered when identifying the next phase of cybersecurity \u2013 a 360<strong>\u00b0 <\/strong>view of the entire threat landscape, beginning with those closest to home.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/22070742\/KasperskyHumanFactor360Report2023.pdf\" target=\"_blank\" rel=\"noopener\"><strong><span class=\"ui-provider ef buw bel bux buy buz bva bvb bvc bvd bve bvf bvg bvh bvi bvj bvk bvl bvm bvn bvo bvp bvq bvr bvs bvt bvu bvv bvw bvx bvy bvz bwa bwb bwc\" dir=\"ltr\">Download PDF version of the report<\/span><\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adopting a Human Factor 360\u00b0 model to assess the global cybersecurity landscape.<\/p>\n","protected":false},"author":2706,"featured_media":49686,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"class_list":["post-49694","page","type-page","status-publish","has-post-thumbnail"],"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/human-factor-360-report-2023\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/human-factor-360-report-2023\/"}],"acf":[],"banners":"","is_landing":true,"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/49694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=49694"}],"version-history":[{"count":39,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/49694\/revisions"}],"predecessor-version":[{"id":49841,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/49694\/revisions\/49841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/49686"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=49694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=49694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}