skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration


It’s time to make changes on attitudes and approaches to cybersecurity, data protection, and business risk. To improve security across all business systems, Ovum recommends that organizations take a more inclusive approach to cybersecurity threat protection.


  • Three security principles that organizations need to understand: No organization is immune from cybersecurity attacks. Never shy away from investigating unusual occurrences, they are indicators of compromise. Any connected device, user, or network component can become the source of a cyberbreach.
  • Keeping systems safe is hard, and isn’t going to get easier. Organizations are threatened by cybersecurity attacks instituted by anything from opportunistic hackers to highly skilled, state-sponsored cyber activists, which means that keeping data and users protected is increasingly difficult.

Features and Benefits

  • This report highlights the approaches needed to deal with cybersecurity threats and the benefits of strong procedures and strategies.
  • The report looks at the targeted nature of cybersecurity attacks and details the approaches commonly used to gain access to business systems.

Key questions answered

  • The common objectives of most cybersecurity attacks include the theft of sensitive data for financial or political gain.
  • Organizations need to have comprehensive strategies and approaches in place to deal effectively with cybersecurity attacks and breaches.

Table of contents


  • Catalyst
  • Ovum view
  • Key messages


  • Recommendations for enterprises

Take a professional and inclusive IT approach to cybersecurity

  • The same decision-making rules should apply to cybersecurity as to any other IT or business project

Cybersecurity attacks pose a serious threat to public and private sector organizations

  • The common objectives of most cybersecurity attacks include the theft of sensitive data for financial or political gain
  • Cyber-espionage and state-sponsored threats need to be taken into account

Cybersecurity attacks are likely to be targeted and determined

  • Cybersecurity attacks are increasingly premeditated
  • Cybersecurity attacks are used to steal all types of data

Dealing with cybersecurity threats involves having strong procedures and strategies in place

  • Organizations need a comprehensive approach for dealing with cybersecurity attacks and breaches


  • Further reading
  • Author

Recommended Articles


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316

Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now