Unveiling the Vulnerabilities and Challenges in IT Landscape: Insights from Kyndryl Global Survey

Managing adverse events is an ongoing challenge for IT decision-makers, as highlighted by a global survey conducted by Kyndryl. The survey, which gathered responses from 300 IT decision-makers, sheds light on the prevalence of cybersecurity-related events and other adverse incidents experienced by organizations. This article delves into the survey findings and discusses the impact of these events on businesses, the challenges faced by IT leaders, and recommendations for managing and mitigating such events.

Statistics on cybersecurity and adverse events

The survey results were startling, with 71% of respondents confirming that they had experienced a cybersecurity-related event. These incidents could range from data breaches and ransomware attacks to phishing attempts and insider threats. Additionally, a staggering 88% reported experiencing non-cybersecurity-related adverse events. These events encompass a wide range of issues, including system failures, power outages, natural disasters, and human error.

Comparison to peers

When asked to compare their organization’s readiness for adverse events with that of their peers, 65% of the IT decision-makers rated their organization’s preparedness as superior. This self-assessment reflects a certain level of confidence in their ability to effectively navigate and mitigate adverse events.

Frequency of adverse events

The survey results indicate that adverse events impacting IT systems are frequent and widespread. An overwhelming 92% of respondents confirmed that their organizations had experienced such events in the past two years. These incidents compromised or disrupted IT systems, causing varying degrees of operational disruption and financial losses.

Types of Adverse Events

Among the types of adverse events reported, IT hardware failure emerged as the most common incident over the past 24 months. This was closely followed by network failures, which further hindered organizations’ ability to maintain smooth IT operations.

Impact of IT issues

The repercussions of IT issues were significant, as revealed by the survey. Half of the IT decision-makers reported operational failures resulting from these events. Such failures could impact productivity, customer service, and overall business performance. Furthermore, 40% admitted that IT issues had led to compliance violations, regulatory fines, or legal consequences. This underscores the importance of maintaining strong cybersecurity practices and adhering to industry regulations.

In addition to tangible consequences, IT issues also had intangible impacts. Approximately 35% of respondents stated that the incidents had damaged their organizations’ brand reputation. This highlights the importance of addressing and resolving IT issues promptly to maintain customer trust. Moreover, 34% of the IT decision-makers reported losing business or revenue due to the adverse IT events.

Challenges in managing adverse events

The survey findings shed light on several challenges that IT decision-makers face when managing adverse events. The most commonly cited challenge was the lack of ability to recover systems and data from encrypted, clean backups. This indicates a potential gap in disaster recovery and business continuity plans. Additionally, the expanding IT footprint posed a challenge for 37% of respondents. As organizations increase their reliance on digital infrastructure, the complexity of managing and securing IT systems grows exponentially.

Staying up-to-date with emerging threats emerged as another top challenge, affecting 34% of IT decision-makers. The constantly evolving landscape of cybersecurity requires organizations to remain vigilant and adapt their security measures accordingly. However, this can be a daunting task without sufficient resources and expertise. A lack of skilled staff was also cited as a challenge by 32% of respondents. The shortage of cybersecurity professionals and IT experts has become a pressing issue for many organizations, making them more vulnerable to cyberattacks and adverse events. Additionally, 28% of IT decision-makers highlighted the challenges associated with relying on third-party IT providers, emphasizing the need for robust vendor management protocols.

Recommendations for IT leaders

In light of the survey findings, Kris Lovejoy, Kyndryl’s global security and resilience leader, stresses the importance of investing in the automation and orchestration of recovery processes. This enables organizations to efficiently restore systems and data after an adverse event. Additionally, assessing and mitigating human error in restoring from backups is crucial to avoid potential pitfalls during the recovery process.

Lovejoy recommends that IT departments test incident response plans repeatedly and frequently to ensure their effectiveness. Regular testing helps identify gaps and weaknesses in the existing plans, allowing organizations to refine their strategies and be better prepared for adverse events.

In an increasingly interconnected and technology-driven world, adverse events have become a constant threat to organizations. The survey conducted by Kyndryl sheds light on the prevalence and impact of these events on IT systems. It highlights the need for IT decision-makers to invest in robust disaster recovery and business continuity plans, enhance cybersecurity measures, and address key challenges faced in managing adverse events. By doing so, organizations can better safeguard their digital infrastructure, mitigate the impact of adverse events, and minimize disruption to their operations.

Explore more

How to Install Kali Linux on VirtualBox in 5 Easy Steps

Imagine a world where cybersecurity threats loom around every digital corner, and the need for skilled professionals to combat these dangers grows daily. Picture yourself stepping into this arena, armed with one of the most powerful tools in the industry, ready to test systems, uncover vulnerabilities, and safeguard networks. This journey begins with setting up a secure, isolated environment to

Trend Analysis: Ransomware Shifts in Manufacturing Sector

Imagine a quiet night shift at a sprawling manufacturing plant, where the hum of machinery suddenly grinds to a halt. A cryptic message flashes across the control room screens, demanding a hefty ransom for stolen data, while production lines stand frozen, costing thousands by the minute. This chilling scenario is becoming all too common as ransomware attacks surge in the

How Can You Protect Your Data During Holiday Shopping?

As the holiday season kicks into high gear, the excitement of snagging the perfect gift during Cyber Monday sales or last-minute Christmas deals often overshadows a darker reality: cybercriminals are lurking in the digital shadows, ready to exploit the frenzy. Picture this—amid the glow of holiday lights and the thrill of a “limited-time offer,” a seemingly harmless email about a

Master Instagram Takeovers with Tips and 2025 Examples

Imagine a brand’s Instagram account suddenly buzzing with fresh energy, drawing in thousands of new eyes as a trusted influencer shares a behind-the-scenes glimpse of a product in action. This surge of engagement, sparked by a single day of curated content, isn’t just a fluke—it’s the power of a well-executed Instagram takeover. In today’s fast-paced digital landscape, where standing out

Will WealthTech See Another Funding Boom Soon?

What happens when technology and wealth management collide in a market hungry for innovation? In recent years, the WealthTech sector—a dynamic slice of FinTech dedicated to revolutionizing investment and financial advisory services—has captured the imagination of investors with its promise of digital transformation. With billions poured into startups during a historic peak just a few years ago, the industry now