48AF3A60-914C-4C95-B1E0-3397FF00C1E9 Created with sketchtool.
Calculator
Russia, All industries, 1 000 employees
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • APAC
  • China
  • Europe
  • Japan
  • LATAM
  • META
  • North America
  • Russia
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • Financial Services
  • Government
  • Industrial/Manufacturing
  • IT & Telecoms
  • Retail & Wholesale
$
Calculate

You are very close to another segment. Would you like to see the results for companies with 250 - 999 employees?

Go
Calculate your company's security profile

This is the ultimate guide to the cost of IT security. Select the details that match your company to see the average budgets your industry peers spend on IT security (by region, industry, size), what security measures they take, the major threat vectors they encounter, how much money they lose as a result, and what you can do to avoid being compromised. The Calculator has been created as an adjustable tool. The data presented can be updated and/or added to over time based on insights from customers and Kaspersky.

IT security budget in 2020
Data provided by 57 respondents*
Russia, All industries, 1 000 employees
IT Security budget makes up 27% of the total IT spend
View analytics for previous years
average
$ 1 545 255
average
$ 1 545 255
max
$ 26 250 000
2020
2023
Expected change to IT security budget in three years
+ 16 %
year
2020
2023
YoY Dynamics
Find out data for my company
Threats experienced in the last 12 months
Data provided by 76 respondents*
Russia, All industries, 1 000 employees
46%
Malware infection of BYOD devices
41%
IT Security policies violation by employees
41%
Viruses & malware
39%
Phishing / social engineering attacks on accounts
37%
Physical loss of BYOD devices
37%
Inappropriate IT resource use by employees
36%
DDoS attacks
34%
Physical loss of company owned mobile devices exposing the organization to risk
34%
Physical loss of devices or media
33%
Data breach
30%
Cryptomalware/ransomware
30%
Electronic leakage of data from internal systems
30%
Inappropriate sharing of data via mobile devices
29%
Attacks on local / branch offices of our company
26%
Cryptomining attacks
25%
Incidents affecting suppliers that the business shares data with
24%
Incidents involving non-computing connected devices
24%
Targeted attacks
21%
Fileless attacks
20%
Supply chain attacks
18%
Incidents affecting virtualized environments
18%
Incidents affecting IT Infrastructure hosted by a third party
13%
Incidents affecting third party cloud services used by the business
12%
Attacks on point-of-sale (POS) systems
3%
Attacks on core transactional / back office systems
3%
Attacks on online banking services
1%
Financial losses due to attacks on ATM
76%
Any cyberthreat
$ 14 250
Average cost of one incident
Security measures in place
Data provided by 69 respondents*
Russia, All industries, 1 000 employees
87%
Web Security
83%
Network Securitу
77%
Anti-DDoS Protection
68%
Services - Threat intelligence
67%
Storage array / network attached storage security software
65%
Security for Virtualization
61%
Services - Incident Response
61%
Services - Security Assessment
60%
Endpoint Protection**
59%
Container Security
59%
Mobile Security
58%
Network Sandboxing
57%
Industrial Cybersecurity
57%
Cloud Workload Security
54%
SOAR
51%
Security solutions specifically designed for SaaS applications
51%
IoT - Transportation Security
49%
Advanced Persistent Threat (APT) Protection
49%
Services - Managed Detection & Response
48%
Services - Security Education & Training
45%
Messaging Security
42%
SIEM
19%
Services - Industrial Cybersecurity Assessment
Recommendations

IT and telecoms companies, data centers and cloud infrastructures, are at the forefront of implementing the newest technological advances, but they are also at the forefront when it comes to encountering the most cyber threats. They have one of the highest rates of virtual infrastructure cyber incidents, not to mention the fact they have to fight off huge amounts of malware and encounter DDoS and similar attacks every day. This means that, besides building a multi-layered defense against malware, they should be using specialized security solutions optimized for virtual environments, and should invest in cyber-awareness training for their staff. Only complete fully-fledged cybersecurity solutions for data centers and cloud-based systems can ensure the continuity of service that is such an important customer consideration for these organizations when they are selecting or changing provider.

IT and telecoms companies in Russia deal with the most DDoS attacks and incidents affecting the suppliers with which they share data. We recommend Russian telecoms companies review their current IT security strategies and consider adding modern threat intelligence to the solutions they have already implemented. If they haven't implemented solutions, they should also consider specific services such as DDoS protection and the encryption of data in motion.

Want to see more statistics?
Fill out this form to download the IT security economics 2020 executive summary: «Investment adjustment: aligning IT budgets with changing security priorities»
Download report
Need help with IT security?
Fill out this form and Kaspersky experts will get in touch
Contact me
*These statistics are based on results from an online survey of 5,266 business representatives from companies with 50 and up to 4,999 employees around the world, conducted in 2020 by Kaspersky and B2B International. Statistics based on less than 30 respondents should be used with caution, due to this being a low base. The significant increase in the IT security budget in 2020 may be caused by the change of the survey sample for several verticals and significant fluctuations in budgets in these verticals.

** The methodology for measuring endpoint protection has been changed: now it represents the penetration of endpoint protection in businesses meaning the proportion of corporate endpoints (both physical devices and virtual endpoints) that have endpoint security software installed in the average organization of this vertical and segment.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information

Accept and Close