Who’s Buying Tech Now —and What It Means for Your Cybersecurity

A recent Forbes survey shows that 75% of enterprise tech buying decisions now happen outside of IT. HR, finance, operations, and other business units are driving decisions —seeking faster results, department-level ownership, and tools tailored to their needs.

But with greater autonomy comes greater responsibility. When identity and security aren’t part of the conversation early on, cybersecurity gaps emerge —and fraudsters take advantage.

Read our breakdown of the Forbes survey below to detect if your company might be at risk.

The New Tech Power Players

This shift isn’t just about decentralization —it’s about empowerment. The people closest to the problem are now choosing the tools to solve it. That means faster adoption, tighter alignment with business needs, and more ownership from the teams actually using the tech.

And it’s not replacing IT —it’s reframing its role. CIOs are stepping into a more strategic position: guiding governance and security while enabling agility across the org. The result? A smarter, more responsive tech ecosystem —if identity and risk are managed right.

Cybersecurity is a Top Concern, But it’s Underfunded.

Despite these shifts, cybersecurity isn’t keeping pace. Forbes found that while 59% of leaders rank security as a top priority, only 17% consider it their biggest area of investment.

This creates a gap between expansion and protection —especially dangerous in a landscape shaped by:

  • AI-generated deepfakes
  • Social engineering
  • Synthetic identities
  • Regulatory pressure (KYC/AML)

Without strong, unified identity verification, every new tool or platform becomes a potential entry point.

Cybersecurity is crucial to protect your business from fraud and cybercrime. Incode Blog
Cybersecurity efforts are crucial to protect businesses from any industry.

The Risks of Fragmented Identity Systems

When each team handles verification on its own, there are some risks that could threaten the business security:

  • Onboarding speed can outweigh fraud checks
  • UX decisions can override security protocols
  • Compliance efforts can become inconsistent or reactive

And when tools vary widely, fraud detection becomes harder to scale.

What Your Business Can Do with Incode

Incode helps organizations stay agile and secure —by embedding real-time, AI-powered identity verification across any workflow.

With Incode, you can:

  • Stop deepfake and spoofing attacks with advanced liveness detection
  • Authenticate real users instantly, using biometrics
  • Automate KYC/AML compliance across departments
  • Prevent impersonation at login, onboarding, and access control points
  • Integrate with no-code tools for fast deployment by non-technical teams
  • Standardize identity checks across the enterprise, even with decentralized buying
  • Protect customer trust without adding friction

Whether your business is centralized or distributed, Incode brings consistent, intelligent identity protection to every touchpoint.

Incode offers advanced antifraud and cybersecurity solutions to protect your business
Incode offers advanced antifraud and cybersecurity solutions to protect your business.

Final Thought: Shared Tech Decisions Require Shared Security

Decentralized buying isn’t the problem —fragmented security is.

The most successful organizations are those that empower teams to move fast, while maintaining centralized oversight for identity, fraud prevention, and compliance. Incode makes that possible.

Want to secure every identity, without slowing anyone down?

Schedule a demo