Yes37%
Maybe44%
No15%
Unsure3%
Multiple environments32%
Segregation of duty45%
Authentication65%
QA testing48%
Key management28%
Security protocols29%
Encryption17%
Other (share details in comments)2%
Ransomware and multifaceted extortion33%
Business email compromise40%
Third-party vendor compromise (supply chain)17%
Cloud security incidents7%
I have no idea1%