48AF3A60-914C-4C95-B1E0-3397FF00C1E9 Created with sketchtool.
Calculator
META, All industries, 1 000 employees
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • APAC & Japan
  • Europe
  • LATAM
  • META
  • North America
  • Russia
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • Finance
  • Government
  • Healthcare
  • Industrial/Manufacturing
  • IT & Telecoms
  • Retail & Wholesale
$
Calculate

You are very close to another segment. Would you like to see the results for companies with 250 - 999 employees?

Go
Calculate your company's security profile

This is the ultimate guide to the cost of IT security. Select the details that match your company to see the average budgets your industry peers spend on IT security (by region, industry, size), what security measures they take, the major threat vectors they encounter, how much money they lose as a result, and what you can do to avoid being compromised. The Calculator has been created as an adjustable tool. The data presented can be updated and/or added to over time based on insights from customers and Kaspersky.

IT security budget in 2019
Data provided by 98 respondents*
META, All industries, 1 000 employees
IT Security budget makes up 32% of the total IT spend
View analytics for previous years
average
$ 6 035 307
average
$ 6 035 307
max
$ 101 250 000
2019
2022
Expected change to IT security budget in three years
+ 11 %
year
2019
2022
YoY Dynamics
Threats experienced in the last 12 months
Data provided by 114 respondents*
META, All industries, 1 000 employees
63%
Data breach
63%
Physical loss of devices or media
62%
Viruses & malware
60%
Inappropriate IT resource use by employees
57%
Inappropriate sharing of data via mobile devices
55%
Incidents involving non-computing connected devices
55%
Electronic leakage of data from internal systems
53%
Targeted attacks
52%
Incidents affecting third party cloud services used by the business
50%
Incidents affecting IT Infrastructure hosted by a third party
50%
DDoS attacks
48%
Incidents affecting virtualized environments
48%
Cryptomining attacks
47%
Cryptomalware/ransomware
46%
Incidents affecting suppliers that the business shares data with
11%
Phishing / social engineering attacks on accounts
8%
Financial losses due to attacks on ATM
8%
Attacks on core transactional / back office systems
5%
Attacks on point-of-sale (POS) systems
5%
Attacks on online banking services
81%
Any cyberthreat
$ 1 041 521
Average cost of one incident
Recommendations

The META region is very fast-growing in terms of information technology and telecommunication development. Generally, the economy's growth strategy is to create an environment that will attract global business, promoting regional development and commercial success. Cybercriminals are well-aware of this approach and believe the META region offers them good opportunities to monetize cyberattacks. Our advice to META businesses is that they should understand the risks, and implement a strong IT security risk mitigation strategy, involving high levels of security awareness enablement for employees. It’s also very important to ensure that core IT security solutions, e.g. endpoint protection platform, cloud security, mobile security and anti-targeted attack solutions, are equipped with the latest and most powerful technologies.

Want to see more statistics?
Fill out this form to download the «IT security economics in 2019: How businesses are losing money and saving costs amid cyberattacks» report
Download report
Need help with IT security?
Fill out this form and Kaspersky experts will get in touch
Contact me
*These statistics are based on results from an online survey of 4,474 business representatives from companies with up to 4,999 employees around the world, conducted in 2019 by Kaspersky and B2B International. Statistics based on less than 30 respondents should be used with caution, due to this being a low base.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information

Accept and Close