Unveiling the Vulnerabilities and Challenges in IT Landscape: Insights from Kyndryl Global Survey

Managing adverse events is an ongoing challenge for IT decision-makers, as highlighted by a global survey conducted by Kyndryl. The survey, which gathered responses from 300 IT decision-makers, sheds light on the prevalence of cybersecurity-related events and other adverse incidents experienced by organizations. This article delves into the survey findings and discusses the impact of these events on businesses, the challenges faced by IT leaders, and recommendations for managing and mitigating such events.

Statistics on cybersecurity and adverse events

The survey results were startling, with 71% of respondents confirming that they had experienced a cybersecurity-related event. These incidents could range from data breaches and ransomware attacks to phishing attempts and insider threats. Additionally, a staggering 88% reported experiencing non-cybersecurity-related adverse events. These events encompass a wide range of issues, including system failures, power outages, natural disasters, and human error.

Comparison to peers

When asked to compare their organization’s readiness for adverse events with that of their peers, 65% of the IT decision-makers rated their organization’s preparedness as superior. This self-assessment reflects a certain level of confidence in their ability to effectively navigate and mitigate adverse events.

Frequency of adverse events

The survey results indicate that adverse events impacting IT systems are frequent and widespread. An overwhelming 92% of respondents confirmed that their organizations had experienced such events in the past two years. These incidents compromised or disrupted IT systems, causing varying degrees of operational disruption and financial losses.

Types of Adverse Events

Among the types of adverse events reported, IT hardware failure emerged as the most common incident over the past 24 months. This was closely followed by network failures, which further hindered organizations’ ability to maintain smooth IT operations.

Impact of IT issues

The repercussions of IT issues were significant, as revealed by the survey. Half of the IT decision-makers reported operational failures resulting from these events. Such failures could impact productivity, customer service, and overall business performance. Furthermore, 40% admitted that IT issues had led to compliance violations, regulatory fines, or legal consequences. This underscores the importance of maintaining strong cybersecurity practices and adhering to industry regulations.

In addition to tangible consequences, IT issues also had intangible impacts. Approximately 35% of respondents stated that the incidents had damaged their organizations’ brand reputation. This highlights the importance of addressing and resolving IT issues promptly to maintain customer trust. Moreover, 34% of the IT decision-makers reported losing business or revenue due to the adverse IT events.

Challenges in managing adverse events

The survey findings shed light on several challenges that IT decision-makers face when managing adverse events. The most commonly cited challenge was the lack of ability to recover systems and data from encrypted, clean backups. This indicates a potential gap in disaster recovery and business continuity plans. Additionally, the expanding IT footprint posed a challenge for 37% of respondents. As organizations increase their reliance on digital infrastructure, the complexity of managing and securing IT systems grows exponentially.

Staying up-to-date with emerging threats emerged as another top challenge, affecting 34% of IT decision-makers. The constantly evolving landscape of cybersecurity requires organizations to remain vigilant and adapt their security measures accordingly. However, this can be a daunting task without sufficient resources and expertise. A lack of skilled staff was also cited as a challenge by 32% of respondents. The shortage of cybersecurity professionals and IT experts has become a pressing issue for many organizations, making them more vulnerable to cyberattacks and adverse events. Additionally, 28% of IT decision-makers highlighted the challenges associated with relying on third-party IT providers, emphasizing the need for robust vendor management protocols.

Recommendations for IT leaders

In light of the survey findings, Kris Lovejoy, Kyndryl’s global security and resilience leader, stresses the importance of investing in the automation and orchestration of recovery processes. This enables organizations to efficiently restore systems and data after an adverse event. Additionally, assessing and mitigating human error in restoring from backups is crucial to avoid potential pitfalls during the recovery process.

Lovejoy recommends that IT departments test incident response plans repeatedly and frequently to ensure their effectiveness. Regular testing helps identify gaps and weaknesses in the existing plans, allowing organizations to refine their strategies and be better prepared for adverse events.

In an increasingly interconnected and technology-driven world, adverse events have become a constant threat to organizations. The survey conducted by Kyndryl sheds light on the prevalence and impact of these events on IT systems. It highlights the need for IT decision-makers to invest in robust disaster recovery and business continuity plans, enhance cybersecurity measures, and address key challenges faced in managing adverse events. By doing so, organizations can better safeguard their digital infrastructure, mitigate the impact of adverse events, and minimize disruption to their operations.

Explore more

A Beginner’s Guide to Data Engineering and DataOps for 2026

While the public often celebrates the triumphs of artificial intelligence and predictive modeling, these high-level insights depend entirely on a hidden, gargantuan plumbing system that keeps data flowing, clean, and accessible. In the current landscape, the realization has settled across the corporate world that a data scientist without a data engineer is like a master chef in a kitchen with

Ethereum Adopts ERC-7730 to Replace Risky Blind Signing

For years, the experience of interacting with decentralized applications on the Ethereum blockchain has been fraught with a precarious and dangerous uncertainty known as blind signing. Every time a user attempted to swap tokens or provide liquidity, their hardware or software wallet would present them with a wall of incomprehensible hexadecimal code, essentially asking them to authorize a financial transaction

Germany Funds KDE to Boost Linux as Windows Alternative

The decision by the German government to allocate a 1.3 million euro grant to the KDE community marks a definitive shift in how European nations view the long-standing dominance of proprietary operating systems like Windows and macOS. This financial injection, facilitated by the Sovereign Tech Fund, serves as a high-stakes investment in the concept of digital sovereignty, aiming to provide

Why Is This $20 Windows 11 Pro and Training Bundle a Steal?

Navigating the complexities of modern computing requires more than just high-end hardware; it demands an operating system that integrates seamlessly with artificial intelligence while providing robust security for sensitive personal and professional data. As of 2026, many users still find themselves tethered to aging software environments that struggle to keep pace with the rapid advancements in cloud computing and data

Notion Launches Developer Platform for AI Agent Management

The modern enterprise currently grapples with an overwhelming explosion of disconnected software tools that fragment critical information and stall meaningful productivity across entire departments. While the shift toward artificial intelligence promised to streamline these disparate workflows, the reality has often resulted in a chaotic landscape where specialized agents lack the necessary context to perform high-stakes tasks autonomously. Organizations frequently find