Most businesses don't think they could respond to a cyberattack today

Representational image of data security
(Image credit: Kingston)

With cyber-threats evolving on a daily basis, talented workers being extremely difficult to find, and security tools being subpar compared to the arsenal of malicious actors, many organizations nowadays don’t feel confident in their ability to respond to incidents, or staying compliant with rules and legislation. 

These are the conclusions in a new research paper from Rackspace Technology, which after surveying 1,420 IT decision-makers across numerous industries, found that two in five (39%) lack the confidence to tackle these issues. Just a third (36%) feel confident in their ability to stay compliant.

The key problem - constantly evolving security threats, such as malware, and attack methods - was cited by almost two-thirds (60%) of respondents. Further on, more than half (53%) don’t have the necessary tools to properly identify security incidents across multi-cloud environments, something they hope will change, within the next three years. 

Third parties to the rescue

Then, there is the issue of talent. Almost half (44%) are struggling to find and retain talented cybersecurity workers. Those skilled in cloud security and data privacy are most in demand these days. To try and solve the problem, most UK businesses rely on in-house staff, with some third-party assistance. The majority, however, (56%) use up to five external cybersecurity providers, including Security Value Added Resellers, Managed Security Service Providers, and Managed Detection & Response Providers.

Integrated risk, application security, and data security are the top three areas most likely outsourced, the report further found.

For Andy Brierley, UK General Manager at Rackspace Technology, cybersecurity is extremely trick to address, mostly due to the accelerated pace at which digital transformation is happening in all the key sectors.

“Given the current digital skills gap and ongoing recruitment challenges, it is important that businesses seek further support from third-party partners to help identify and address their weaknesses,” he said.

“Few businesses have all bases covered – people, processes, and technology in place – when it comes to a mature cybersecurity model. Working with a partner that can bring these specialist skills and tailor them to specific requirements is an increasingly popular and effective way to ensure and increase overall confidence in addressing cybersecurity needs.”

Make sure to also check out our list of the best firewall providers today

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
An abstract image of digital security.
Tackling the UK's cybersecurity skills shortage
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Cyber-security
Many firms see cyberattacks as their top business concern this year
Latest in Security
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
person at a computer
Infamous ransomware hackers reveal new tool to brute-force VPNs
person at a computer
Many workers are overconfident at spotting phishing attacks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Data Breach
Thousands of healthcare records exposed online, including private patient information
Latest in News
Panos Panay and Alexa Plus
Amazon's Panos Panay teases future Alexa+ devices from speakers to possible wearables
Metroid Prime 4
I reckon the Nintendo Switch 2 could launch with Metroid Prime 4 – here’s why
Samsung Galaxy Z Fold 6
New rumors predict a foldable iPhone will launch next year – and cost almost twice as much as the iPhone 16 Pro Max
Pebble smartwatch countdown
Pebble confirms its smartwatch announcement is just hours away
Logo of YouTube Shorts
Is YouTube auto-playing Shorts when you open the app? Well, you’re not alone - here’s how to fix it
Google DeepMind panel discussion
“More sovereignty and protection” - Google goes all-in on UK AI with data residency, upskilling projects, and startup investments