Cybersecurity

The Security and Compliance Concerns of IT Professionals Are Evolving

Explore the challenges and experiences that IT professionals faced in 2024 as reported in our Kaseya Cybersecurity Survey Report 2024

5 minute read

IT professionals face a myriad of challenges as they try to navigate the often murky security and compliance landscape. We explored some of their experiences in the “Kaseya Cybersecurity Survey Report 2024,” uncovering critical insights into the pressures shaping today’s IT strategies. From grappling with rising cyberthreats to meeting complex regulatory requirements, IT teams are tasked with striking a balance between proactive risk management and operational efficiency. Gaining insight into the roadblocks and hazards they might encounter, along with the strategic moves they are making, may help shed new light on managing security and compliance in an increasingly unpredictable environment.

NIST is the leading framework

Organizations are using a mix of global and regional frameworks to address different operational, regulatory and security needs. The most popular cybersecurity framework amongst our survey respondents is NIST (40%), followed by Zero Trust (36%) and ISO 27001 (27%). The popularity of NIST, Zero Trust and ISO 27001 indicates a focus on proactive security measures, risk management and compliance with international standards.

Which of the following cybersecurity frameworks do you currently utilize?

Framework% of Responses
NIST40%
Zero Trust36%
ISO 2700127%
MITRE ATT&CK20%
CIS20%
CMMC14%
COBIT13%
ASD Essential 88%
NCSC CAF8%
Source: Kaseya

Vulnerability assessment frequency on the rise

The frequency of vulnerability assessments has risen significantly, with 24% of organizations conducting them more than four times annually in 2024, compared to 15% in 2023. In contrast, biannual assessments have declined from 29% to 18% while annual assessments remain consistent at 18%. This trend underscores an increasing focus on frequent and proactive security evaluations, driven by tightening regulations and an evolving cybersecurity landscape.

Approximately how frequently does your organization conduct IT security vulnerability assessments?

20242023
More than 4 times per year24%15%
3 to 4 times per year22%23%
2 times per year18%29%
1 time per year18%20%
Less frequently than once per year11%10%
Never/I don’t know7%4%
Source: Kaseya

Fear of phishing and ransomware attacks has declined

IT professionals appear confident in the defenses they have implemented. Respondents view phishing and ransomware as moderate risks, with 43% considering phishing “somewhat likely” to occur within the next 12 months and 36% expressing the same view about ransomware. This indicates both awareness of these threats and trust in current security measures, contributing to a reduced perception of successful attack likelihood. However, despite this confidence, maintaining vigilance remains essential.

What do you believe is the likelihood that your organization will experience a successful phishing attack in the next 12 months?

Likelihood of falling victim to a phishing attackResponse
Extremely likely8%
Very likely17%
Somewhat likely43%
Not very likely27%
Not at all likely5%
Source: Kaseya

What do you believe is the likelihood your organization will experience a successful ransomware attack in the next 12 months?

Likelihood of falling victim to a ransomware attackResponse
Extremely likely3%
Very likely12%
Somewhat likely36%
Not very likely41%
Not at all likely9%
Source: Kaseya

Concern about human error is mounting

Our data reveals a notable rise in concern over human error, increasing to 36% this year, reflecting heightened awareness of social engineering and distraction as significant threat vectors. At the same time, concerns about endpoint threats, including servers and laptops, have sharply declined — server concerns dropped from 12% to 4%, and laptops from 11% to 6%. This data underscores a shift in focus toward addressing human error and cloud security, accompanied by a reduced emphasis on traditional vectors such as email and endpoint security.

Which of the following threat vectors are you most concerned about being the gateway to a successful attack in the next 12 months?

Attack Vector20242023
Email22%25%
Human error (social engineering, distraction)36%16%
Endpoint (server)4%12%
Endpoint (laptop)6%11%
Cloud13%10%
Network4%8%
Insider threats4%6%
Supply chain2%5%
Unpatched systems (zero day attacks)7%5%
Source: Kaseya

Top security management challenges

Organizations are primarily concerned with human factors (error, culture, skills) and budget constraints, suggesting a strong need for affordable, human-centric solutions. The top four security challenges that IT professionals anticipate facing in 2025 are human error (19%), budget constraints (16%), IT and security skills (14%) and building a security culture (13%). The relatively low concern for technical risks might suggest misplaced confidence, emphasizing the importance of maintaining vigilance across all threat vectors.

What do you anticipate will be your top security management challenge in the next 12 months?

ConcernResponse
Human error19%
Budget16%
IT and security skills14%
Building a security culture13%
Don’t know11%
Governance (framework)9%
Security awareness training6%
Staffing4%
Insider risk3%
Zero day attacks3%
Supply chain risk2%
Source: Kaseya

Future security and compliance success will require careful management

As IT professionals navigate the ever-evolving cybersecurity landscape, the challenges are as dynamic as the emerging technologies shaping the field. Yet, these challenges also present opportunities. Building a robust IT infrastructure isn’t just about countering today’s threats. It’s also about fostering resilience and agility to tackle future challenges. As we look ahead, innovation, strategic investments in advanced solutions and a focus on preparedness will be essential for securing a safer and more resilient digital future.

Simplify security and compliance management with the right tools

RapidFire Tools equips IT professionals with smart solutions that make it easier to manage security and bolster compliance.

Simplify compliance with Compliance Manager GRC, which automates processes, assigns tasks, and delivers real-time insights — turning compliance into a scalable, profitable service.

Gain full network visibility with Network Detective Pro, a cloud-based platform that uncovers and manages risks, saves time, and strengthens client retention through actionable insights and professional reports.

Protect against evolving threats with VulScan featuring comprehensive vulnerability scanning that enables the discovery, prioritization, and mitigation of internal and external risks.

Ready to take your risk and compliance management to the next level?

Learn more about how our automated risk and compliance management solutions can help streamline your compliance processes and elevate your service offerings.

What to Look for in Network Assessment Software

With cybercrime becoming increasingly sophisticated, what you don't know can hurt your organization. In this buyer's guide, learn about the tools you need to implement an effective IT assessment strategy to identify threats.

Download Now
IT Network Assessment Buyers Guide