top of page
  • Crystal Bedell

2019 cybersecurity statistics for content marketers

Updated: Mar 1, 2019



(ISC)2 Cybersecurity Workforce Study

Survey of ~1,500 self-identified security professionals worldwide, including IT professionals who spend at least 25% of their time on security-related tasks.


Notable findings:

  • Global cybersecurity workforce shortage is 2.93 million professionals

  • About 48% of respondents expect their company to increase cybersecurity staffing in the next 12 months

  • 35% of survey respondents identified as Millennials; Baby Boomers and Gen X accounted for 49% of respondents

For more info, see SearchSecurity.com’s coverage of the study: (ISC)2: Cybersecurity workforce shortage nears 3 million worldwide


TEKsystems’ Skills Rankings

The IT services provider polled IT leaders across every major industry on their opinions of top technology initiatives in 2019.


Notable findings:

  • 90% of IT leaders report that they will be in the implementation or planning phase of a security-related initiative in 2019

  • Security-related skills are the second most difficult-to-find skills in 2019, moving up one position from 2018 when it was the third most difficult-to-find skill

For more info, see TEKsystems’ press release.


TrendMicro’s Cyber Risk Index

A survey of more than 1,000 IT security professionals in the United States. Commissioned by cybersecurity vendor TrendMicro and conducted by The Ponemon Institute, the survey measures business risk based on the difference between organizations’ current security posture and their likelihood of attack.


Notable findings:

  • 80% of IT business leaders anticipate a critical breach or successful cyberattack over the coming year

  • Top four data types at highest risk of loss or theft are R&D information, trade secrets, customer accounts, and companies’ confidential information

  • Small businesses are the most vulnerable to cyber risk

  • Top cyber threats include phishing and social engineering, clickjacking, ransomware, botnets, and SQL and code injection

10 views0 comments
bottom of page