Unveiling the Vulnerabilities and Challenges in IT Landscape: Insights from Kyndryl Global Survey

Managing adverse events is an ongoing challenge for IT decision-makers, as highlighted by a global survey conducted by Kyndryl. The survey, which gathered responses from 300 IT decision-makers, sheds light on the prevalence of cybersecurity-related events and other adverse incidents experienced by organizations. This article delves into the survey findings and discusses the impact of these events on businesses, the challenges faced by IT leaders, and recommendations for managing and mitigating such events.

Statistics on cybersecurity and adverse events

The survey results were startling, with 71% of respondents confirming that they had experienced a cybersecurity-related event. These incidents could range from data breaches and ransomware attacks to phishing attempts and insider threats. Additionally, a staggering 88% reported experiencing non-cybersecurity-related adverse events. These events encompass a wide range of issues, including system failures, power outages, natural disasters, and human error.

Comparison to peers

When asked to compare their organization’s readiness for adverse events with that of their peers, 65% of the IT decision-makers rated their organization’s preparedness as superior. This self-assessment reflects a certain level of confidence in their ability to effectively navigate and mitigate adverse events.

Frequency of adverse events

The survey results indicate that adverse events impacting IT systems are frequent and widespread. An overwhelming 92% of respondents confirmed that their organizations had experienced such events in the past two years. These incidents compromised or disrupted IT systems, causing varying degrees of operational disruption and financial losses.

Types of Adverse Events

Among the types of adverse events reported, IT hardware failure emerged as the most common incident over the past 24 months. This was closely followed by network failures, which further hindered organizations’ ability to maintain smooth IT operations.

Impact of IT issues

The repercussions of IT issues were significant, as revealed by the survey. Half of the IT decision-makers reported operational failures resulting from these events. Such failures could impact productivity, customer service, and overall business performance. Furthermore, 40% admitted that IT issues had led to compliance violations, regulatory fines, or legal consequences. This underscores the importance of maintaining strong cybersecurity practices and adhering to industry regulations.

In addition to tangible consequences, IT issues also had intangible impacts. Approximately 35% of respondents stated that the incidents had damaged their organizations’ brand reputation. This highlights the importance of addressing and resolving IT issues promptly to maintain customer trust. Moreover, 34% of the IT decision-makers reported losing business or revenue due to the adverse IT events.

Challenges in managing adverse events

The survey findings shed light on several challenges that IT decision-makers face when managing adverse events. The most commonly cited challenge was the lack of ability to recover systems and data from encrypted, clean backups. This indicates a potential gap in disaster recovery and business continuity plans. Additionally, the expanding IT footprint posed a challenge for 37% of respondents. As organizations increase their reliance on digital infrastructure, the complexity of managing and securing IT systems grows exponentially.

Staying up-to-date with emerging threats emerged as another top challenge, affecting 34% of IT decision-makers. The constantly evolving landscape of cybersecurity requires organizations to remain vigilant and adapt their security measures accordingly. However, this can be a daunting task without sufficient resources and expertise. A lack of skilled staff was also cited as a challenge by 32% of respondents. The shortage of cybersecurity professionals and IT experts has become a pressing issue for many organizations, making them more vulnerable to cyberattacks and adverse events. Additionally, 28% of IT decision-makers highlighted the challenges associated with relying on third-party IT providers, emphasizing the need for robust vendor management protocols.

Recommendations for IT leaders

In light of the survey findings, Kris Lovejoy, Kyndryl’s global security and resilience leader, stresses the importance of investing in the automation and orchestration of recovery processes. This enables organizations to efficiently restore systems and data after an adverse event. Additionally, assessing and mitigating human error in restoring from backups is crucial to avoid potential pitfalls during the recovery process.

Lovejoy recommends that IT departments test incident response plans repeatedly and frequently to ensure their effectiveness. Regular testing helps identify gaps and weaknesses in the existing plans, allowing organizations to refine their strategies and be better prepared for adverse events.

In an increasingly interconnected and technology-driven world, adverse events have become a constant threat to organizations. The survey conducted by Kyndryl sheds light on the prevalence and impact of these events on IT systems. It highlights the need for IT decision-makers to invest in robust disaster recovery and business continuity plans, enhance cybersecurity measures, and address key challenges faced in managing adverse events. By doing so, organizations can better safeguard their digital infrastructure, mitigate the impact of adverse events, and minimize disruption to their operations.

Explore more

Strategies for Navigating the Shift to 6G Without Vendor Lock-In

The global telecommunications landscape is currently standing at a crossroads where the promise of near-instantaneous connectivity meets the sobering reality of complex architectural transitions. As enterprises begin to look beyond the current capabilities of 5G-Advanced, the move toward 6G is being framed not merely as an incremental boost in peak data rates but as a fundamental reimagining of what a

How Do You Choose the Best Wi-Fi Router in 2026?

Modern households and professional home offices now rely on wireless networking as the invisible backbone of daily existence, making the selection of a router one of the most consequential technology decisions a consumer can face. The current digital landscape is defined by an intricate web of high-bandwidth activities, ranging from immersive virtual reality meetings to the constant telemetry of dozens

Hotels Must Bolster Cybersecurity to Protect Guest Data

The digital transformation of the global hospitality industry has fundamentally altered the relationship between hotels and their guests, turning data protection into a cornerstone of operational integrity. As properties transition into digital-first enterprises, the safeguarding of guest information has evolved from a niche IT task into a vital pillar of brand reputation. This shift is driven by the reality that

How Do Instant Payments Reshape Global Business Standards?

The traditional three-day settlement cycle that once governed global commerce has effectively dissolved into a relic of financial history as real-time payment systems become the universal benchmark for corporate operations. In the current economic landscape of 2026, the speed of capital movement has finally synchronized with the speed of digital information, creating a paradigm where instantaneous transaction finality is no

Can China Dominate the Global 6G Technology Market?

The global telecommunications landscape is currently witnessing a seismic shift as China officially accelerates its pursuit of next-generation connectivity through the approval of expansive field trials and technical standardization protocols for 6G technology. This strategic move, recently sanctioned by the Ministry of Industry and Information Technology, specifically greenlights the extensive use of the 6 GHz frequency band for intensive regional