<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Survey Results: Major Security and Compliance Concerns for Businesses

Ipswitch Blog| March 09 2011

| security

We’ve got some fresh stats and trends to share from data that we collected at the recent RSA Security Conference.  Many thanks to the "statistically significant" number of people that took the time to fill out our survey questionnaire.

Our survey results highlight some major security and compliance concerns for businesses – information security, visibility and policy enforcement remain a major problem in 2011.  Here are a few key data points:

  • 65% have no visibility into files and data leaving their organization
  • >80% use easily lost or stolen portable devices like USB drives and smartphones to move and backup confidential work files
  • >75% send classified documents as email attachments – including payroll, customer data and financial information
  • >25% percent have purposely used a personal email account (like yahoo or hotmail or gmail) instead of their work accounts as a way to hide their file transfer activity
  • 55 percent said their companies provide – but do not enforce – policies and tools around sharing sensitive information

The fact that so many companies admittedly lack visibility into the files and documents that are moving around and leaving their organization is pretty scary.  How can an organization protect information that they don’t know even exists?  Clearly, increased focus is needed to first identifying sensitive data and then protecting it – These critical information security components should be carefully baked into an organizations security, governance and compliance initiatives.

Lastly, I'd like to vent on the last data point for a minute.  Policy creation simply isn’t enough.... the enforcement of that policy is the critical step.  Writing down a policy but not enforcing it is just as risky as not having documented the policy in the first place. Creating the policy is a good start, but please please please don’t stop there.

Topics: security

Leave a Reply

Your email address will not be published. Required fields are marked *

THIS POST WAS WRITTEN BY Ipswitch Blog

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters. 

Send us a note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.