9 Cyber Security Problems Nearly Every Organization Struggles With

office buildings with notification icons above 

You don’t have to look far to find news of a major data breach these days. It seems as though cyber security is a term sitting front and center on many minds while damage from malicious attacks continues to accumulate.

“Cyber security is ever-changing and a bit scarier than most people think,” says Taher Hamid, IT professional and marketing manager with Alltek Services. “If a criminal gets access to your network they can lock up all of your data, but they can also steal sensitive data from your clients.”

Despite the potential for disastrous results, many organizations are still struggling to treat cyber security like a business-ending, bottom-line financial threat. And the companies who’d like to ante up find it hard to keep up with the speed of cybercrime. As cyberattacks become more common, that failure has greater likelihood of becoming expensive. One thing is for sure: If businesses can’t afford a top-notch cyber security team, they definitely can’t afford to be in the dark about information security either.

“Common sense security practices will stop the vast majority of threats,” Hamid says. “Unfortunately, many organizations don’t even have the easy stuff in place.”

So what issues keep information security pros and business leaders up at night? To get a better picture of the threats in the cyber landscape, we asked professionals in cyber security to share some of the most common cyber security problems they see.

The top cyber security problems organizations are facing

Cyber security problems can range from things as granular as out-of-date software to large-scale struggles like a lack of support from leadership teams. The following is a sampling of the most common issues facing information security professionals and the organizations they serve.

1. Recognizing that you are a target

Small organizations don’t always realize that their assets and data are still attractive to cyber criminals. “In our modern economy, most companies have things that attackers want—information and money, says Matthew Eshleman, CTO of Community IT. “Cyber threats face organizations of every size.”

A basic grasp of cyber security best practices would be a huge step in the right direction for many companies, says Kevin Raske, cyber security marketing specialist at Vipre. “It means being constantly aware that you are a target. The majority of breaches occur because of human error.” Acknowledging that attackers might come after your company is step No. 1 to developing a defense.

2. Underfunded cyber security teams

“Between managing active threats, training staff and compliance requirements, it’s easy for cyber security teams to get overwhelmed as their companies scale,” says Andrew Douthwaite, CTO at VirtualArmour. “The tight market for highly trained cyber security professionals doesn’t help in this regard.”

Many in-house cyber security teams spend most of their days putting out fires, leaving little time to proactively develop future strategies and provide guidance to team members, Douthwaite says. Without the time or resources to look ahead, cyber security professionals may struggle to take the measures that would truly benefit their security long-term.

“Ultimately it comes down to bandwidth and budget, but business leaders need a realistic plan to scale their cyber security capabilities as they grow.”

3. Missing security patches

“Out of the 100+ vulnerability assessments that I have run for various organizations, there are always security patches missing from their equipment—typically user workstations and laptops,” says Courtney Jackson, CEO and cyber security expert at Paragon Cyber Solutions LLC.

“It may seem like a small issue but it isn’t,” Jackson says. “The security patches are published to address identified vulnerabilities. Delaying the installation of new security patches puts organizations’ assets at risk.”

4. Lax email security

“Without a doubt, ransomware is one of the largest threats facing organizations of all sizes,” Raske says. These days, anyone can buy ransomware ready-made and launch their own attacks.

Raske cites the 2019 Verizon Data Breach Investigations Report findings that ransomware makes up 24 percent of the malware impacting companies—and over 90 percent of all malware is delivered into networks via email.

It seems pretty foolish for a company to ignore email security strategies, but Raske says it happens far more often than you might think. “The general email spam filtering that you see in basic email clients is not enough. Email filters develop to stop malicious messages, but cybercriminals have shifted to utilizing attachments to launch malware on devices and networks,” Raske says.

Given the sheer volume of emails traveling to, from and within an organization in a day, this is an issue area that has a high chance of causing harm. “A simple Microsoft Office macro could bring down the entire network. Over 40 percent of malware is actually delivered via attachment.”

5. Losing sight of the ‘backup plan’

“Most companies don’t see backups as part of their cyber security initiative,” says Marius Nel, CEO of 360 Smart Networks. He explains that people often rely on systems or services to keep their data protected and forget to consistently back up their data as a fail-safe. “The system should be built in way that assumes all other services will eventually fail and backups will be required,” Nel says.

Take the Baltimore City ransomware attack that recently hit, Hamid says. “The city confirmed that not all of the mission critical data was backed up. Without paying the ransom or the ability to decrypt, the data is gone forever. Incremental offsite backup is so important, yet often overlooked.”

Hamid says ransomware is all over the market. “Businesses do their best to hide it from their customers and the community. But, coming from the team that cleans up the mess afterwards, I can tell you it is more prevalent than most people think.”

6. Bring Your Own Device (BYOD) threats

Bring your own device policies are popular in many companies, according to Douthwaite. BYOD lets employees use their own machines for work in office or remotely to make things easier. “But many business leaders don’t appreciate the unique threats that a BYOD environment can invite into their organizations,” Douthwaite says.

“A few common-sense steps can better protect business networks from threats related to BYOD.” Some of these measures could be role-based access, enabling two-factor authentication and enacting network access controls to ensure all devices remain continuously updated. Douthwaite says requiring strong employee passwords and having an exit process to clear ex-employee devices of company data should also be a must.

7. Lack of a corporate security program

“One surprisingly prevalent issue that companies face when it comes to security is their lack of a formal corporate security program,” Jackson says. “Every company, no matter the size, should have a corporate security policy outlining acceptable use, incident response, physical security and at least a dozen more areas.”

She says this proactive approach to cyber security is the missing ingredient with many businesses. “I wish the average business executive understood that not having an effective cyber security program in place within their business puts them at great risk of an attack or data breach.”

8. Treating cyber security like an IT issue instead of a financial issue

Many business leaders still treat cyber security like an IT issue, when these days, it’s really about the bottom line. “At its core, cyber security attacks are a financial issue,” Douthwaite says. “Data shows that the average cost of a data breach is about $4 million.”

Nel says they’ve learned that companies with strong cyber security treat it as a “way of life,” mixing it into every part of the business. “In essence, it is a business risk mitigation exercise that requires strategic thinking and ongoing tactical actions.”

This necessitates employee training. Nel says training end users in basic cyber security is the most effective and cheapest way to protect an organization.

9. Lack of representation on the board

Many companies have very robust policies and procedures for their business processes, according to Braden Perry, cyber security attorney with Kennyhertz Perry, LLC. “That is something sophisticated board members can understand. But IT is a different language for a businessperson, and unfortunately, most board members ignore or defer these issues.”

Perry says even a business IT department with an amazing, proactive plan for information security might never get the resources and backing they need since board members don’t understand cyber threats.

“It’s becoming more important, and almost imperative, that a board has an experienced IT or cyber security liaison to translate the IT language into business and vice versa,” Perry says, adding that when he is hired to investigate a problem, it’s usually an issue the business could have resolved on its own, if it had better communications between the IT department and senior leadership.

The need to stay on top of cyber security

“Cyber security can no longer be ignored by organizations,” Raske says. “A ransomware attack alone could lead to business-threatening downtime, negative PR, lost customer data and lost revenue. There are over 6 million data records stolen every day.”

And unfortunately, very little can be solved long-term by a single program. Anyone engaging in cyber security needs the time to stay on top of industry changes. “Cyber security threats and sophistication change more than a new baby’s diaper,” Hamid says. “Without having someone who is constantly learning and adapting to these changes, you are inevitably falling behind and becoming increasingly susceptible to attack.”

Existing systems admins and DevOps professionals do not have the time to properly manage and run cyber security, Nel says. “It needs to be handled like finance or operations or any other part of the business with ongoing responsibilities.”

But as several of our experts have noted, great cyber security professionals are in short supply. While that’s an uneasy fact for those running businesses, it could also be a boon for those who’ve dedicated themselves to this field. If reading this list hooked your interest—you could be just the kind of candidate they’re looking for.

Learn more about the qualities you’ll need to succeed in the field in our article, “8 Signs You’re Wired for Working in a Cyber Security Career.”

Brianna Flavin

Brianna is a content writer for Collegis Education who writes student focused articles on behalf of Rasmussen University. She earned her MFA in poetry and teaches as an adjunct English instructor. She loves to write, teach and talk about the power of effective communication.

female writer

Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

logo-accreditation-acenlogo-accreditation-ccnechart-credential-laddering-associates-bachelors-masters0 Credits90 Credits180 Credits48 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTSStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE’S DEGREEStart HereMASTER’S DEGREEPURSUERSEnd HereBACHELOR’S DEGREEEnd HereMASTER’S DEGREEchart-credential-laddering-associates-bachelors0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS90 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-healthcare-management0 Credits90 Credits180 Credits48 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTSStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE’S DEGREEStart HereMASTER’S DEGREEPURSUERSEnd HereBACHELOR’S DEGREEEnd HereMASTER’S DEGREEchart-credential-laddering-rsb0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS90 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-rsd0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS91 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE181 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-rsjs0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS91 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-rsn0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS91 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE181 CreditsEnd HereBACHELOR'S DEGREEicon-colored-outline-bankicon-colored-outline-certificateicon-colored-outline-circle-dollar-signicon-colored-outline-folder-searchicon-colored-outline-hand-hearticon-colored-outline-head-blocksicon-colored-outline-head-cogicon-colored-outline-head-hearticon-colored-outline-health-plus-leavesicon-colored-outline-hospitalicon-colored-outline-lifelong-learningicon-colored-outline-light-bulb-analyticsicon-colored-outline-maginify-glassicon-colored-outline-magnifying-glassicon-colored-outline-monitor-healthcareicon-colored-outline-monitor-paper-searchicon-colored-outline-nurse-raysicon-colored-outline-padlock-shieldicon-colored-outline-scalesicon-bankicon-general-charticon-general-connecticon-general-degreeicon-general-discussicon-general-emailicon-general-findicon-general-haticon-general-hearticon-general-laptop-buildingicon-general-laptopicon-general-leadericon-general-mapicon-general-moneyicon-general-paperworkicon-general-peopleicon-general-phoneicon-general-speak-outicon-head-hearticon-mglassicon-scalesrebrand-arrowsicon-colored-advanceicon-colored-arrows-cross-curveicon-colored-briefcase-staricon-colored-buildicon-colored-bulb-analyticsicon-colored-certificateicon-colored-continual-developmenticon-colored-duo-chatboxicon-colored-folder-mortarboardicon-colored-forward-ribbonicon-colored-gears-clockicon-colored-globe-penicon-colored-growthicon-colored-hand-bubbleicon-colored-hand-starsicon-colored-hands-gearicon-colored-head-blocksicon-colored-head-cogicon-colored-laptop-cbe-skyscrapericon-colored-laptop-checkmarkicon-colored-laptop-webpageicon-colored-location-mapicon-colored-location-pinicon-colored-monitor-paper-scanicon-colored-mortarboard-dollaricon-colored-nationalicon-colored-people-chat-bubblesicon-colored-person-cheer-staricon-colored-person-laptop-checkboxesicon-colored-person-screen-instructoricon-colored-person-whiteboardicon-colored-phone-chatboxicon-colored-police-lighticon-colored-prepicon-colored-presentericon-colored-regionalicon-colored-save-timeicon-colored-shirt-haticon-colored-skyscrapericon-colored-stateicon-colored-student-centeredicon-colored-supporticon-colored-world-experienceicon-arrowicon-cameraicon-filtericon-info-circleicon-mail-forwardicon-play-solidicon-quote-mark-lefticon-quote-mark-righticon-share-square-oicon-spinnericon-tagicon-simple-chaticon-simple-desktopicon-simple-findicon-simple-hamburgericon-simple-phoneicon-testimonial-quotesicon-social-facebook-square-coloredicon-social-facebook-squareicon-social-facebookicon-social-google-plus-squareicon-social-google-plusicon-social-instagramicon-social-linkedin-square-coloredicon-social-linkedin-squareicon-social-linkedinicon-social-pinterest-picon-social-twitter-squareicon-social-twittericon-social-youtube-play-coloredicon-social-youtube-playlogo-rasu-horizontalras-logo-flameras-logo-horizontalras-logo-stackedicon-util-checkbox-whiteicon-util-checkboxicon-util-checked-whiteicon-util-checkedicon-util-chevron-downicon-util-chevron-lefticon-util-chevron-righticon-util-chevron-upicon-util-language-switchicon-util-loadingicon-util-open-window-buttonicon-util-open-window-linkicon-util-pdf-buttonicon-util-pdf-linkicon-util-refreshicon-util-x