SHARE
Facebook X Pinterest WhatsApp

Is Sharing Data With the Government a Good Idea?

Feb 8, 2016

Is Sharing Threat Data With the Government a Good Idea?

Is Sharing Threat Data With the Government a Good Idea?Is Sharing Threat Data With the Government a Good Idea?

Sharing threat info with the public sector is considered acceptable, but many organizations oppose granting the government backdoor access to encrypted systems.

Top Cyber-Threats to Organizations in 2016Top Cyber-Threats to Organizations in 2016

Social engineering: 52%, Insider threats: 40%, Advanced persistent threats: 39%, Cyber-crimes: 32%, Unpatched systems: 31%

Virtual ProblemVirtual Problem

23% of survey respondents say that virtualized servers pose the biggest security risk to their data center environment, while 18% cite virtualized networking.

Prudent PairingPrudent Pairing

44% say their organization has added two-factor authentication to improve security within their virtualized data centers, and 29% have initiated dual-person approvals for certain actions.

Staffing SurgeStaffing Surge

Nearly half say their organization plans to hire more cyber-security pros this year.

Red AlertRed Alert

38% believe there is a “high” likelihood that a cyber-security attack disrupts critical infrastructure—such as an electrical grid or water supply system—in 2016.

Shared KnowledgeShared Knowledge

57% are in favor of the U.S. Cybersecurity Act of 2015, which encourages the sharing of threat information between the private sector and the government.

Off-LimitsOff-Limits

63% say governments should not have backdoor access to encrypted information systems.

Significant TradeoffSignificant Tradeoff

59% feel that privacy is being compromised in the effort for stronger cyber-security regulations/legislation.

Transparent StanceTransparent Stance

84% are in favor of regulation that would require businesses to notify customers about a data breach within 30 days of its discovery.

Image IssueImage Issue

Despite support for breach disclosures to customers, 57% of survey respondents say concerns over corporate reputation present great challenges in issuing such notifications.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.