CIO Influence
CIO Influence News Cloud IT and DevOps Security

Rubrik Reveals 90% of Global IT and Security Executives Report Cyberattacks in the Past Year

Rubrik Reveals 90% of Global IT and Security Executives Report Cyberattacks in the Past Year

Rubrik Logo

Data sprawl drives spike in cyber incidents across AI, cloud, SaaS, and on-premise environments, according to Rubrik Zero Labs Report

New research from Rubrik Zero Labs finds that organizations are facing a wave of cyberattacks, with 90% of IT and security leaders reporting cyberattacks in the past year. The report, “The State of Data Security in 2025: A Distributed Crisis,” reveals the hazards that hybrid environments are creating, leading to a cloud security crisis that organizations are unprepared to address.

“Many organizations that move to the cloud assume their providers will handle security,” said Joe Hladik, Head of Rubrik Zero Labs. “The persistence of ransomware attacks, coupled with the exploitation of hybrid cloud vulnerabilities, shows that threat actors are always one step ahead. Companies must take action and adopt an attacker’s mindset by identifying – and protecting – the most valuable data before it’s too late. The need for a data-centric security strategy that prioritizes visibility, control, and quick recovery has never been more urgent.”

The Frequency and Impact of Cyberattacks Accelerate

Cyberattacks are a constant threat:

  • Nearly one fifth of organizations globally experienced more than 25 cyberattacks in 2024 alone, according to IT and security leaders – an average of at least one breach every other week.
  • The most common attack vectors cited were data breaches (30%), malware on devices (29%), cloud or SaaS breaches (28%), phishing (28%), and insider threats (28%).
  • Consequences of these attacks include:
    • 40% of respondents reported increased security costs.
    • 37% noted reputational damage and loss of customer confidence.
    • 33% experienced a forced leadership change following a cyber incident.

Also Read: CoreWeave Launches NVIDIA GB200 Grace Blackwell Systems at Scale

AI, Cloud Adoption and Greater Data Complexity Create New Challenges

Protecting sensitive data across multiple systems has become increasingly nuanced as the widespread adoption of AI has significantly exacerbated the challenge of data sprawl. An overwhelming 90% of IT and security leaders report managing hybrid cloud environments, and half of IT leaders say the majority of their workloads are now cloud-based.

As a result, “The State of Data Security in 2025: A Distributed Crisis” found:

  • 35% of respondents cite securing data across these varied ecosystems as their top challenge, followed by a lack of centralized management (30%), and a lack of visibility and control over cloud-based data (29%).
  • 36% of sensitive files in the cloud are classified as high risk and are largely composed of Personally Identifiable Information (PII), such as Social Security numbers and phone numbers; followed by digital data and business data, such as intellectual property and source code. (Rubrik telemetry data)

Ransomware and Identity Threats Evolve in Tandem

Ransomware remains a persistent and evolving threat:

  • Of the organizations that experienced a successful ransomware attack last year, 86% admitted they paid a ransom to recover their data.
  • Nearly three-quarters (74%) said threat actors were able to partially compromise backup and recovery systems, while 35% said their systems were completely compromised.

Identity threats are intensifying, fueled by the complexity of today’s hybrid environments:

  • With 92% of organizations using between two and five cloud and SaaS platforms, attackers are exploiting weak points in identity and access management to move laterally and escalate ransomware attacks.
  • Insider threats – often driven by compromised credentials – were cited by 28% of IT leaders, underscoring the growing difficulty of maintaining strong access controls across distributed systems.
  • Rubrik telemetry reveals that 27% of high-risk sensitive files contain digital data such as API keys, usernames, and account numbers – exactly the kind of information threat actors seek to hijack identities and infiltrate critical systems.

Also Read: How Network Tooling Impacts IT Professionals’ Job Performance and Satisfaction

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

Synopsys Accelerates Advanced Chip Design with First-Pass Silicon Success of IP Portfolio on TSMC 3nm Process

PR Newswire

Scala Data Centers Opens More Than 100 New Job Positions for its Operations in Latin America

CIO Influence News Desk

Persistent Cited as Leader in ISG Provider Lens Archetype Report on Next Generation Hybrid Cloud Services