You are very close to another segment. Would you like to see the results for companies with 250 - 999 employees?
This is the ultimate guide to the cost of IT security. Select the details that match your company to see the average budgets your industry peers spend on IT security (by region, industry, size), what security measures they take, the major threat vectors they encounter, how much money they lose as a result, and what you can do to avoid being compromised. The Calculator has been created as an adjustable tool. The data presented can be updated and/or added to over time based on insights from customers and Kaspersky.
IT and telecoms companies, data centers and cloud infrastructures, are at the forefront of implementing the newest technological advances, but they are also at the forefront when it comes to encountering the most cyber threats. They have one of the highest rates of virtual infrastructure cyber incidents, not to mention the fact they have to fight off huge amounts of malware and encounter DDoS and similar attacks every day. This means that, besides building a multi-layered defense against malware, they should be using specialized security solutions optimized for virtual environments, and should invest in cyber-awareness training for their staff. Only complete fully-fledged cybersecurity solutions for data centers and cloud-based systems can ensure the continuity of service that is such an important customer consideration for these organizations when they are selecting or changing provider.
North America is one of the most developed regions from an IT and telecommunications standpoint, making this area a high priority for attackers armed with the latest cyberthreats. North American IT and telecoms companies regularly find themselves the subject of targeted attacks and encounter incidents on infrastructure hosted by third parties, during data exchange with partners, and with cloud services. So, North American telecoms companies should be ready to be 'early adopters' implementing all the latest IT security technologies e.g. anti-targeted attack solutions, cloud security, EDR and threat intelligence, as soon as they become available.