courses.reviews logo
I launched a free website to help you find the best courses with reviews & discounts.
Up to date
Published
4 min read

Trevor I. Lasn

Staff Software Engineer, Engineering Manager

Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment

New research reveals a shocking loss of control in corporate IT environments

A new Cloudflare study drops a bombshell: 39% of companies are losing grip on their IT and security environments. That’s nearly 4 out of 10 businesses navigating the digital realm without a clear map.

Gone are the days when a locked server room and a sturdy firewall were enough. Today’s IT landscape is a different animal entirely.

The study also reveals that IT and security teams are drowning in new responsibilities. We’re not just talking about a few extra tasks - we’re talking about a complete overhaul of their roles. Five years ago, many of these teams weren’t responsible for things like:

  • Ensuring security for remote and hybrid workers
  • Compliance with an ever-growing list of government regulations
  • Managing and securing applications in the public cloud

"Which of the following falls under the responsibility of the IT and security teams at your company?”

It’s like asking a chef to suddenly become a concert pianist while still cooking a five-course meal. Sure, they’re both in the service industry, but the skills are worlds apart.

The Complexity Crunch

The Cloudflare study doesn’t just highlight new responsibilities - it shines a spotlight on the skyrocketing complexity of everyday IT tasks. Let’s zoom in on a seemingly mundane aspect of office life: ensuring in-office connectivity.

Nearly half of the survey respondents reported that this basic function has become significantly more complex since 2020. It’s a startling revelation. Think about it - we’re not talking about cutting-edge tech or bleeding-edge security protocols. We’re talking about Bob from accounting being able to check his email.

So, what’s changed? Several factors are at play:

  • Hybrid work models: With employees toggling between home and office, networks must now seamlessly support a fluid workforce. It’s no longer just about bandwidth, but about creating consistent, secure experiences across locations.
  • Increased security threats: Every connection is now a potential vulnerability. IT teams must balance accessibility with robust security measures, turning simple network access into a complex dance of authentication and monitoring.
  • BYOD policies: The line between personal and work devices has blurred. Supporting a diverse ecosystem of devices, each with its own quirks and security implications, adds layers of complexity.
  • Cloud-based applications: With more business-critical apps living in the cloud, ensuring reliable, fast connections isn’t just about internal networks anymore. It’s about managing the entire data journey, from user to cloud and back.
  • Compliance requirements: Data protection regulations have teeth now. Even something as simple as an employee logging in might involve navigating a minefield of compliance issues.

"IT And Security Team Responsibilities Increases Over The Last Five Years"

This complexity creep isn’t just an inconvenience - it’s a fundamental shift in how IT operates. Tasks that once ran on autopilot now require constant attention and expertise. It’s as if the rules of gravity have changed, and IT teams are learning to walk all over again.

The result? A drain on resources, increased potential for errors, and a perpetual game of catch-up. What used to be the equivalent of changing a light bulb has become more akin to rewiring an entire city’s electrical grid - while it’s still running.

In this new reality, the role of IT has evolved from maintainer to innovator, problem-solver, and sometimes, digital magician. They’re not just keeping the lights on anymore - they’re building a whole new power plant while the demand for electricity is surging.

This complexity crunch isn’t just a phase - it’s the new normal. And it’s forcing companies to rethink not just their IT strategies, but their entire approach to digital infrastructure.

So, what’s the solution? The study dangles a tantalizing possibility: a “connectivity cloud.” It sounds like tech nirvana – a unified, secure, all-seeing eye in the digital chaos. And businesses are ready to throw money at it, to the tune of 16% of their IT budgets.

But here’s my take: There’s no magic wand in tech. The real solution starts with facing the music. We’re in uncharted waters, and the old maps don’t work anymore. Facing the music means:

  • Acknowledging complexity: We need to accept that simplicity in IT is a thing of the past. The interconnected nature of our systems means every solution will have ripple effects.
  • Continuous learning: The pace of change means that expertise has an expiration date. We need to foster a culture of constant upskilling and adaptation.

Found this article helpful? You might enjoy my free newsletter. I share dev tips and insights to help you grow your coding skills and advance your tech career.

Interested in supporting this blog in exchange for a shoutout? Get in touch.


Liked this post?

Check out these related articles that might be useful for you. They cover similar topics and provide additional insights.

Tech
4 min read

When Regex Goes Wrong

Issues and catastrophic failures caused by regex

Aug 29, 2024
Read article
Tech
5 min read

Repopack (now Repomix): Pack Your Entire Repository Into A Single File

A tool that packages your code to easily share with LLM models.

Oct 21, 2024
Read article
Tech
5 min read

The Fight to Free JavaScript from Oracle's Control

The creator of JavaScript and Node.js are challenging Oracle's control over the JavaScript name

Nov 23, 2024
Read article
Tech
8 min read

Apple's Secret Sauce: The Untold Stories Behind Its Success

Diving deep into the lesser-known factors that propelled Apple from a garage startup to a tech titan

Sep 30, 2024
Read article
Tech
5 min read

Pkl: Apple's New Configuration Language That Could Replace JSON and YAML

A deep dive into Pkl, Apple's configuration language that aims to replace JSON and YAML

Nov 1, 2024
Read article
Tech
4 min read

Sentry's LLM Integration Makes Error Debugging Actually Smart

How Sentry.io is using Large Language Models to transform error debugging from mindless stack trace reading to intelligent problem-solving

Nov 24, 2024
Read article
Tech
5 min read

Understanding Agent2Agent (A2A): A Protocol for LLM Communication

An exploration of Google's new open protocol that enables different AI systems to exchange information and collaborate

Apr 13, 2025
Read article
Tech
3 min read

Honey Quietly Hijacked Creator Revenue Through Affiliate Link Switching

Honey's controversial affiliate link practices and what it teaches us about Silicon Valley's ethics

Jan 4, 2025
Read article
Tech
3 min read

The Crutch Effect: How AI Tools Became A Crutch

Introducing The Crutch Effect

Sep 13, 2024
Read article

This article was originally published on https://www.trevorlasn.com/blog/39-percent-companies-losing-control-of-it-and-security. It was written by a human and polished using grammar tools for clarity.