This statistic presents the most common obstacles to adopting advanced security processes and technology according to security professionals worldwide. As of April 2018, 34 percent of respondents in the United States said that budged constraints were the biggest obstacle to adopting advanced cyber security processes.
Which of the following do you consider the biggest obstacles to adopting advanced cyber security processes and technology?
Characteristic
Australia
Brazil
Canada
France
Germany
India
Italy
Japan
Mexico
China
Russia
Spain
UK
United States
MEA*
Other European countries**
Other Latin American countries***
Budget constraints
23%
35%
29%
33%
25%
36%
38%
31%
31%
38%
60%
33%
27%
34%
36%
37%
35%
Competing priorities
28%
11%
29%
27%
28%
26%
24%
27%
16%
27%
20%
18%
32%
32%
25%
18%
24%
Lack of trained personnel
25%
28%
19%
22%
24%
31%
24%
28%
30%
25%
35%
33%
31%
26%
25%
23%
26%
Lack of knowledge about advanced security processes and technology
26%
26%
24%
21%
22%
24%
21%
26%
23%
29%
18%
21%
27%
22%
22%
17%
21%
Compatibility issues with legal systems
27%
19%
30%
27%
30%
30%
22%
23%
32%
40%
25%
25%
24%
28%
30%
25%
28%
Certification requirements
33%
27%
29%
29%
24%
27%
27%
22%
27%
23%
22%
27%
27%
30%
24%
33%
21%
Organizational culture/attitude and secrecy
30%
23%
25%
20%
16%
26%
17%
21%
26%
17%
19%
24%
28%
25%
20%
20%
27%
Reluctant to purchase until they proven in the market
19%
20%
23%
26%
25%
29%
20%
28%
15%
16%
17%
20%
21%
22%
22%
21%
25%
Current workload too heavy to take on new responsibilities
22%
16%
28%
18%
28%
28%
26%
27%
23%
21%
15%
28%
22%
22%
20%
17%
19%
Organization is not a high-value target for attacks
* MEA: Saudi Arabia, South Africa, Turkey, UAE
** Other European Countries: Belgium, Netherlands, Poland, Switzerland & Sweden
***Other Latin American Countries: Argentina, Chile & Colombia
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
Cisco Systems (Cisco Security Research). (February 27, 2018). Which of the following do you consider the biggest obstacles to adopting advanced cyber security processes and technology? [Graph]. In Statista. Retrieved December 30, 2024, from https://www.statista.com/statistics/881182/global-obstacles-to-adopting-advanced-security-processes/
Cisco Systems (Cisco Security Research). "Which of the following do you consider the biggest obstacles to adopting advanced cyber security processes and technology?." Chart. February 27, 2018. Statista. Accessed December 30, 2024. https://www.statista.com/statistics/881182/global-obstacles-to-adopting-advanced-security-processes/
Cisco Systems (Cisco Security Research). (2018). Which of the following do you consider the biggest obstacles to adopting advanced cyber security processes and technology?. Statista. Statista Inc.. Accessed: December 30, 2024. https://www.statista.com/statistics/881182/global-obstacles-to-adopting-advanced-security-processes/
Cisco Systems (Cisco Security Research). "Which of The following Do You Consider The Biggest Obstacles to Adopting Advanced Cyber Security Processes and Technology?." Statista, Statista Inc., 27 Feb 2018, https://www.statista.com/statistics/881182/global-obstacles-to-adopting-advanced-security-processes/
Cisco Systems (Cisco Security Research), Which of the following do you consider the biggest obstacles to adopting advanced cyber security processes and technology? Statista, https://www.statista.com/statistics/881182/global-obstacles-to-adopting-advanced-security-processes/ (last visited December 30, 2024)
Which of the following do you consider the biggest obstacles to adopting advanced cyber security processes and technology? [Graph], Cisco Systems (Cisco Security Research), February 27, 2018. [Online]. Available: https://www.statista.com/statistics/881182/global-obstacles-to-adopting-advanced-security-processes/