2024 Survey Insights

2024 Survey Insights
Adam Cassar

Co-Founder

1 min read

Our recent survey of Australian CISOs and CTOs provides valuable insights into the current state and future plans for account protection and cybersecurity measures. Here are the key findings:

  1. Multi-Factor Authentication (MFA) Adoption: 76.23% of Australian businesses use MFA, indicating a strong recognition of basic security needs.

  2. Bot Protection: Currently implemented by 39.34% of organizations, with an additional 34.65% planning to adopt it in the future.

  3. Bot Management Solutions: Cloudflare leads the market with 48.24% usage among respondents.

  4. Residential Proxy (Resip) Detection: Only 13.11% of organizations currently use this technology, but many plan to implement it soon to address this emerging threat.

  5. Credential Stuffing Concerns: Businesses are planning various measures to combat this persistent threat, including bot protection, MFA, and checking credentials against known breaches.

  6. Mobile Security Gap: Low adoption of Web Application and API Protection (WAAP) suggests potential vulnerabilities in mobile application security.

  7. Executive vs. Engineer Priorities: The survey revealed differences in cybersecurity priorities between these two groups, highlighting the need for a comprehensive approach.

These findings underscore the growing awareness of account protection challenges and the need for more robust, multi-layered security strategies in Australian businesses.

Enterprise-Grade Security and Performance

Peakhour offers enterprise-grade security to shield your applications from DDoS attacks, bots, and online fraud, while our global CDN ensures optimal performance.

Contact Us

Related Content

Beyond the IP Address

Beyond the IP Address

Discover why traditional IP-based rate limiting is obsolete and how advanced techniques provide robust protection against modern distributed attacks.

The CAPTCHA Conundrum

The CAPTCHA Conundrum

Explore why traditional CAPTCHAs are failing both users and security, and discover modern, invisible alternatives.

Key Considerations for Effective Bot Management

Key Considerations for Effective Bot Management

With nearly half of all internet traffic being automated, a robust bot management strategy is essential. This article explores the key considerations for effective bot detection, classification, and response in the face of evolving threats.

How to Use Bot Management for IAM Use Cases

How to Use Bot Management for IAM Use Cases

Bots are used in both security and nonsecurity attacks. Identity and access management leaders must build a strong business case for a bot management capability or their organizations will incur avoidable losses due to account takeovers and also be unprepared to manage the risks introduced by customers using AI agents.

© PEAKHOUR.IO PTY LTD 2025   ABN 76 619 930 826    All rights reserved.