Keeping business systems safe and protecting the data that they hold has never been more difficult to achieve, according to Ovum.

It is a commitment that continues to be threatened by security attacks ranging from opportunistic hackers using pre-built tools through to targeted, well-resourced, state-sponsored cyber activity.

According to Ovum’s latest Security 2014 Trends To Watch report; any type of organisation can be targeted. Even the best-protected government, military and business systems have already been breached, and in 2014 they will to be put under further pressure.

The top security trends to watch including needing more proactive protection to address the cyber security time bomb. Security-as-a-service will be the way forward for a growing number of organizations and cloud and mobility will change the way we approach IT security and user protection.

Andrew Kellett, principal analyst, software IT solutions and author of the report says, "In 2014, cyber espionage and state-sponsored threats will continue to make headlines, but the concerning underlying trend is that similar technology can and will be used against ordinary businesses."

"Security experts recognise the rise in use of sophisticated malware, and this is driving the need for better and more proactive security," says Kellett.

However, he adds, "Organisations will be required to fundamentally shift their approach to security from a mainly static defensive posture to one of taking positive action before or as an attack takes place."

In 2014, enterprise organisations will need to gain positive advantages from security intelligence, Big Data analytics, and the ability to understand threat priorities and the actions needed to sustain the well-being of the organisation and its users.

Ovum believes the need for better security will be driven by operational demands, including the use of technology that makes business information more readily available and consequently more vulnerable to cyber-attacks. Increasing use of cloud-based services, user mobility and multiple devices is adding complexity to security, particularly identity management requirements.

"Ovum recommends that organisations should look to gain positive advantages from Big Data, security intelligence and analytics-based approaches to security management. Meanwhile, mainstream security vendors need to provide a range of products and services that genuinely meet the protection needs of both SMEs and large enterprise clients," concludes Kellett.