Menu

Corporate Leaders See External Hackers, Internal Staff Errors, as Top Cybersecurity Breach Causes

Increased Customer and Employee Friction May Be Necessary to Thwart Threats

EisnerAmper survey on cybersecurity and CX

It is a familiar story that tends to be repeated month after month, year after year: a large organization reports that its customer data has been exposed via a data breach, and notices are sent out to affected customers. In January 2023 alone, organizations such as Twitter, Chick-fil-A, PayPal, MailChimp, and T-Mobile announced data breaches. The organizations typically promise to redouble their efforts to close the gaps that led to the breach, enhance customer and employee cybersecurity training, and provide “friendly reminders” to customers about the need to remain vigilant against cybersecurity scams.

And while federal authorities continue to chase down bad actors, such as the FBI’s takedown of Hive, a ransomware group that has extorted more than $100 million from schools, hospitals, and others around the world, there are still many threats targeting small, medium, and enterprise-size companies. However, according to the results of an online survey conducted by EisnerAmper, external hackers (75%) and accidental internal staff errors (71%) were cited as the top two expected likely causes for cybersecurity breaches.

The online survey was taken by 113 predominantly chief executive officers/owners/ presidents, chief risk officers, chief finance officers, chief technology officers, chief operating officers, and vice presidents of finance during November 2022. Companies surveyed include financial services, real estate, manufacturing and distribution, and technology, with representation from other sectors such as healthcare, professional services, and nonprofits. Most companies are in the annual revenue range of $50 million to $500 million and have 10 to 99 employees.

Yet, despite the concerns about external and internal cyber threats, only 50% of survey respondents say they conduct regular training, and most executives interviewed for the survey said they will not change IT personnel nor increase their IT budgets.

One of the reasons that good cybersecurity can increase friction is the layered nature of a strong defense. Instead of relying on a single technology or strategy to thwart would-be hackers or careless employees, robust security practices are multifaceted and are designed to introduce friction.

“Similar to layers of an onion, the more strata that concisely fit together strengthen the overall endeavor,” explains Rahul Mahna, Managing Director at Eisner Advisory Group’s Outsourced IT Services team. “However, if you look at one layer on its own it appears weak and flimsy. It’s the job of an IT department to educate the firm’s people and [explain] the reasoning that one layer augments the security of other layers. If this is not explained clearly and comprehensively, then it will appear to be problematic and burdensome to the employees of the firm.”

This is also true for customers, who may feel that security measures, such as multi-factor authentication, captchas, and other security mechanisms that appear to make interacting with a company more difficult are necessary to ensure their safety, as well as the safety of the company.

“When we implement solutions in our practice, we spend a substantial amount of time explaining and educating on the ‘why,’” Mahna explains. “We have found that taking the time for this explanation period significantly mitigates the organization friction (and potential risk) that could occur.”  

The EisnerAmper survey also highlighted the disconnect between the awareness of potential cybersecurity issues that are the result of employee actions, and the use of internal training. According to the survey, 71% of executives believe a cyber breach could occur from internal actions, but 31% had not conducted a cybersecurity training event or session.

“We believe this stems from the idea that there is no “magic bullet” to solve an IT problem,” Mahna says. “To effectively have a cybersecurity mindset requires a commitment to a budget and constant review, training on and evolution of the programs in place.”

Organizations that collect and store large amounts of personally identifiable information (PII) are particularly at risk for cyberattacks and breaches because the data is extremely valuable, fetching anywhere from a few dollars (such as a customer’s address) or item to several hundreds of dollars (for a person’s complete medical record), according to Keeper.com. That is why Mahna suggests that organizations conduct IT risk assessments on an annual basis to gauge the firm’s cyber resiliency and its weaknesses.

Author Information

Keith Kirkpatrick is VP & Research Director, Enterprise Software & Digital Workflows for The Futurum Group. Keith has over 25 years of experience in research, marketing, and consulting-based fields.

He has authored in-depth reports and market forecast studies covering artificial intelligence, biometrics, data analytics, robotics, high performance computing, and quantum computing, with a specific focus on the use of these technologies within large enterprise organizations and SMBs. He has also established strong working relationships with the international technology vendor community and is a frequent speaker at industry conferences and events.

In his career as a financial and technology journalist he has written for national and trade publications, including BusinessWeek, CNBC.com, Investment Dealers’ Digest, The Red Herring, The Communications of the ACM, and Mobile Computing & Communications, among others.

He is a member of the Association of Independent Information Professionals (AIIP).

Keith holds dual Bachelor of Arts degrees in Magazine Journalism and Sociology from Syracuse University.

Latest Insights:
Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning
March 6, 2026
Article
Article

Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning

Dion Hinchcliffe is Vice President & Practice Lead, CIO & Technology Buyers reviews Okta’s Q4 FY 2026 earnings, focusing on agentic identity positioning, evolving pricing models, and how large-customer platform expansion may...
Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience
March 6, 2026
Article
Article

Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience

Fernando Montenegro, VP and Practice Lead, Cybersecurity at Futurum, examines how Commvault’s bi-directional integration with CrowdStrike Falcon Next-Gen SIEM enables shared backup-integrity telemetry to fasten recovery after cyberattacks....
CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus
March 6, 2026
Article
Article

CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus

Fernando Montenegro, VP Cybersecurity at Futurum, highlights CrowdStrike’s Q4 FY26 earnings: Falcon expands into AI security, identity, and browser runtime, underscoring consolidation-driven cybersecurity strategies....
Broadcom Q1 FY 2026 Earnings Driven by XPU Momentum
March 5, 2026
Article
Article

Broadcom Q1 FY 2026 Earnings Driven by XPU Momentum

Brendan Burke, Research Director at Futurum, analyzes Broadcom’s Q1 FY 2026 earnings, focusing on AI accelerator and networking momentum, expanding custom XPU programs, and VMware’s role in AI-era private cloud operations....
Latest Research:
SiTime's Titan Platform and the Importance of MEMS Resonators
March 4, 2026
Research
Research

SiTime’s Titan Platform and the Importance of MEMS Resonators

In our latest market report, SiTime’s Titan Platform and the Importance of MEMS Resonators, completed in partnership with SiTime, Futurum Research examines how Titan’s miniaturization, integration, and resilience advantages could...
Nokia’s Global Data Center Network Migration: From Legacy Complexity to Automated, Reliable Operations
March 3, 2026
Research
Research

Nokia’s Global Data Center Network Migration: From Legacy Complexity to Automated, Reliable Operations

In our latest report, Nokia’s Global Data Center Network Migration: From Legacy Complexity to Automated, Reliable Operations, completed in partnership with Nokia, Futurum Research details Nokia IT’s automation-first data center...
Cybersecurity in the Age of AI: Moving from Fragile to Resilient
February 27, 2026
Research
Research

Cybersecurity in the Age of AI: Moving from Fragile to Resilient

In this Futurum Research report, Cybersecurity in the Age of AI: Moving from Fragile to Resilient, created in collaboration with N-able, we outline a modern framework for business resilience built...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.