The Impossible Puzzle of Cybersecurity

Discover the day-to-day reality on the frontlines of cybersecurity with this independent survey of 3,100 IT managers across 12 countries. The report's findings reveal that organizations face an impossible puzzle when it comes to securing against cyber threats.

Read this report to discover:

  • How many organizations were hit by ransomware, phishing, malicious code, and software exploits in the last year
  • The most common ways attacks get into organizations
  • What IT managers said about cybersecurity recruitment and budgets
Where does this information come from?

To simplify data entry, our forms use autocomplete functionality to fill in company contact information. This information comes from publicly available information. No private company data is being used. It simply makes it so you don't need to enter your company's information.