b55a39d9e52a4074
b55a39d9e52a4074
2022 Thales
Data Threat Report
Navigating Data Security in an Era
of Hybrid Work, Ransomware and
Accelerated Cloud Transformation
#2022DataThreatReport
cpl.thalesgroup.com
2022 Thales Data Threat Report: Global Edition
Introduction
As the pandemic continues to affect both business and personal
lives, expectations of a ‘return’ to pre-pandemic conditions have
faded from most plans. Underlying trends that have always
driven information security, such as new technologies, greater
compliance mandates and more severe security incidents,
continue to be significant change agents. The 2022 Thales Data
Threat Report, based on data from a survey of almost 2,800
respondents from 17 countries across the globe, illustrates these
trends and changes. This report examines the implications of the
survey responses and explores their meaning to security strategies
and how organizations should plan for the year ahead.
Source: 2022 Data Threat custom survey from 451 Research, part of S&P Global Market
Intelligence, commissioned by Thales
56%
of global respondents ranked malware as the leading
source of security attacks.
21%
of all respondents said they had experienced
a ransomware attack.
2
cpl.thalesgroup.com
#2022DataThreatReport
Contents
Key Findings 6
Security Threats 8
Quantum Computing 13
Moving Ahead 21
3
2022 Thales Data Threat Report: Global Edition
COVID-19 (Continues)
to Change Everything
The COVID-19 pandemic, with its waves of infection from New technologies and increased cloud consumption
variants, is shifting mindsets from taking urgent action to continued to grow at the same rapid rates as last year. In
handling a chronic condition. The impacts continue to cause the 2021 report, 16% of respondents used more than 50
lasting changes within enterprises with ripple effects throughout software-as-a-service (SaaS) apps. In the 2022 report, 34%
the security community. The durable shift to remote work of respondents said they used more than 50 SaaS apps and
continues to alter mindsets – enterprises are realizing that more than 16% said they used more than 100 SaaS apps.
what seemed to be a singular event may extend indefinitely. Some progress has been made despite market disruptions.
Despite another full year of remote work and newer Last year, only 17% of respondents said that more than 50%
technology adoption, 79% of respondents indicated they are of their sensitive cloud data was protected with encryption.
still ‘somewhat’ or ‘very concerned’ about the security risks and This year, 22% said that more than 60% of their sensitive cloud
threats that a greatly increased remote workforce poses. 40% data is encrypted. The financial services sector is also a bright
said they are not confident that their current security systems spot for cloud data protection and encryption; 19% of financial
could effectively secure remote work. enterprise respondents said that more than 80% of their
sensitive cloud data is encrypted. However, there remains work
to be done in data identification, classification and protection
in the context of the shifting threat and risk landscape.
79%
is more complex to manage
privacy and data protection
regulations in a cloud
environment than in on-
premises networks within of businesses remain concerned about the security risks of an
their organization.” increasingly remote workforce.
22%
of respondents disclosed that more than 60% of their sensitive
data has been encrypted.
4
cpl.thalesgroup.com
#2022DataThreatReport
5
2022 Thales Data Threat Report: Global Edition
01 Key Findings
• R
ansomware has changed breach economics;
enterprises must refine their responses.
• Post-quantum security should further accelerate data
security hygiene.
• P andemic pressures are impacting security approaches
and spending.
• Remote work is a risk that needs to be managed more
effectively.
• There is significant momentum in cloud migration, but
many necessary controls are lagging.
• Encryption use to protect sensitive data in cloud is low –
a significant risk.
• Global awareness of changing risks is high, but this
hasn’t catalyzed organizations to address them.
• Zero trust architectures need to show more improvement
in security outcomes.
• Breaches and their impacts weigh on security planning.
• Misalignment in understanding security impacts
between management and practitioners could affect
planning and budgeting.
There is a correlation
between investment in
compliance and breach
outcomes. It seems efforts to
improve compliance lead to
better security outcomes.”
6
cpl.thalesgroup.com
#2022DataThreatReport
43%
of senior leaders reported an increase in attacks from the
28%
of senior leaders said they would not entrust their personal data
prior year. to their organization.
7
2022 Thales Data Threat Report: Global Edition
Security Threats
Breaches are a trailing indicator of security effectiveness. The We asked respondents reporting an increase in cyberattacks
research also examined forward-looking metrics, including to identify the type of attack in which they’d seen the greatest
perceptions about security threats. We asked the panel to increase in activity, and 56% of global respondents ranked
identify levels of attack activity and understanding about attack malware as the leading source of security attacks. Ransomware
risks. Almost half (45%) of respondents reported seeing an ranked second (53%) and phishing/whaling rounded out the
increase in the volume, severity and/or scope of cyberattacks top three (40%). Last year, respondents chose malware at 54%,
in the past 12 months. These perceptions were consistent across ransomware at 48% and phishing/whaling at 40%.
all geographies.
Looking forward, we asked the panel to rank their expectations
To gauge overall risk levels, enterprises need to better for the greatest risks to their environments from a set of choices.
understand the locations and classes of data. In 2022, only This year, 29% of respondents ranked ‘accidental human error’
56% of respondents were very confident or had complete as the top threat, with 78% of respondents ranking accidental
knowledge of where their data was being stored, down from or human error in their top four threats. 19% of respondents
64% in 2021. cited attackers with geopolitical goals (i.e., ‘nation-state
actors’) as the top threat, followed by 17% who cited external
Only 25% of all respondents said they could classify all their attackers with financial motivations. Curiously, only 9% of
data and 53% said they could classify at least half of their data respondents chose malicious insiders with financial motivations
in 2022, compared to 2021, when 31% of respondents claimed as the top threat, with 62% of all respondents ranking this
to be able to classify all data and 54% said they can classify threat in their top four. Last year, 35% of respondents identified
at least 50% of the data. As other parts of this report show, the malicious insiders as the top threat.
dynamic nature and growth of the cloud only adds a challenge
for organizations to understand their data’s risks and sensitivities.
2021 2022
12% 21% 26% 41% 28% 21% 26% 25%
Nation States Nation States
Source: 451 Research’s 2021 and 2022 Data Threat custom surveys
8
cpl.thalesgroup.com
#2022DataThreatReport
9
2022 Thales Data Threat Report: Global Edition
50%
of companies with annual revenue greater than $1bn said they
22%
of respondents worldwide said they have paid or would pay
do not have a formal ransomware plan. a ransom for their data.
10
cpl.thalesgroup.com
#2022DataThreatReport
57% of respondents said that their companies have successfully Prevalence of Recent Breaches,
passed their compliance audits. Of those that have passed,
40% have had a breach. Yet only 12% of companies that have Compliance Success
passed compliance audits have experienced a breach in the
last 12 months. There is a correlation between investment in HAVE YOU EXPERIENCED A BREACH IN THE
L AST 12 MONTHS?
compliance and breach outcomes. It seems efforts to improve
compliance lead to better security outcomes. 2021
Of note, ‘safe harbors’ for breach notification came down in
2022. In 2021, 46% of respondents said they had avoided a Yes 18%
breach notification because underlying data was encrypted
or tokenized. In 2022, only 40% of respondents avoided a No 82%
breach notification because data was protected and covered
by safe harbors. In general, there was also a slight decline in
breach notifications, with 32% of respondents issuing a breach
notification compared to 36% the prior year.
2022
The use of cloud-based infrastructure exposes new risks as
an organization’s data footprint expands. The research also
looked at breaches tied to cloud; 44% reported that they Yes 12%
had experienced a breach or failed an audit in their cloud
environments, a slight step back from the 40% of last year’s No 88%
respondents. The report found that there is a lack of maturity in
cloud data security with limited use of encryption, perceived
or experienced multicloud complexity and rapid growth of Source: 451 Research’s 2021 and 2022 Data Threat custom surveys
enterprise data.
11
2022 Thales Data Threat Report: Global Edition
2022
Yes 46% No 54 %
Source: 451 Research’s 2021 and 2022 Data Threat custom survey
40%
of respondents said they had avoided a breach notification
because underlying data was encrypted or tokenized.
12
Quantum
Computing
As part of last year’s report, we studied the perceived risks
of quantum computing and its potential to break current
cryptographic approaches. Nearly half (47%) of the 2021
respondents said they were very concerned about the security
threats of quantum computing. More education, interest and
activity in post-quantum security (PQS) have been created this
past year. When asked to identify security threats from quantum
computing this year, 52% said they were concerned with
‘tomorrow’s decryption of today’s data’ and 58% said future
‘network decryption.’ Encouragingly, only 2% of respondents
said they are not presently concerned. Last year, one-sixth of
respondents were completely unconcerned.
13
2022 Thales Data Threat Report: Global Edition
year, that number dropped to 16%. Last year, only 34% were at ZTNA / SDP
53%
least ‘somewhat confident’; this year, 60% said they are ‘highly’
36%
or ‘significantly’ confident.
14
cpl.thalesgroup.com
#2022DataThreatReport
15
2022 Thales Data Threat Report: Global Edition
16
cpl.thalesgroup.com
#2022DataThreatReport
security strategy, down from 24% last year. Within the Global
Access Management Index (AMI) Report, we’ll dig deeper
into some of the operational challenges with remote access,
17
with some implication for ZTNA approaches.
2022 Thales Data Threat Report: Global Edition
31%
This year, our research looked at present and future security
technology spending. We found a much greater diversity
of technology spending priorities than last year by asking
respondents to identify and rank the top three technologies by
importance. Last year, the technology categories of data-loss
prevention (DLP), encryption/key management, DevSecOps
and cloud security all came in above 30%, with DLP the highest
at 39% and cloud security at 35%. In 2022, no single category of respondents prioritized network security (IPS,
had more than 30%. Network security – firewalls, network gateways, firewalls), and no other technology
access control, etc. – came in at 29%, and DLP fell all the way category scored above 30%, compared to last year
to 23%.
18
cpl.thalesgroup.com
#2022DataThreatReport
14%
organization currently deploys five to seven key management
products, and 14% of respondents said that they employ eight
or more key management products. The larger the number of
systems in place, the greater the risk for error and the more
work required to manage the combination successfully.
19
2022 Thales Data Threat Report: Global Edition
Moving
Organizations large and small are reconsidering their security journeys
as they recalibrate their expectations for the year ahead. Insights from
this year’s research can be useful in identifying how to improve those
journeys and ensure better outcomes. Any idea that the urgent changes
Ahead
of the previous year were only a temporary disruption should be put
aside; the primary goal is to build security capabilities with the flexibility
to easily adapt to new realities. Organizations have to:
capabilities across on- only reduces toil but can also reduce risk by minimizing the chance of
errors. In an increasingly hybrid infrastructure, putting in place systems
premises and cloud that use common operational capabilities across on-premises and
21
2022 Thales Data Threat Report: Global Edition
Sweden
103
USA Netherlands
511 101 Germany Hong Kong
252 102
UK
259 Japan
Canada 203
Mexico 105 South Korea
103 UAE 104
103 India
France 204 Singapore
252 105
Brazil
102 Australia
105
New Zealand
53
22
cpl.thalesgroup.com
#2022DataThreatReport
23
Contact us
For all office locations and contact information,
please visit cpl.thalesgroup.com/contact-us
cpl.thalesgroup.com/data-threat-report