Unstructured Data, Unending Security Concerns

 
 
By Karen A. Frenkel  |  Posted 01-04-2016 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Unstructured Data, Unending Security Concerns
    Next

    Unstructured Data, Unending Security Concerns

    IT pros are concerned that unstructured data moving through its lifecycle will yield more data privacy breaches and complicate advanced content management systems.
  • Previous
    Widespread Concern About File Data Leakage Risks
    Next

    Widespread Concern About File Data Leakage Risks

    All organizations surveyed are concerned about file data leakage risks, with 75% expressing high- to very-high concern.
  • Previous
    Pervasive Low Confidence in Security Controls
    Next

    Pervasive Low Confidence in Security Controls

    84% of respondents have moderate to no confidence in their security controls and auditing capacity to secure confidential files.
  • Previous
    Majority Experience File Data Leakage
    Next

    Majority Experience File Data Leakage

    80% of respondents have experienced file data leakage in their organizations. Half have had frequent incidents.
  • Previous
    Top Causes of Data Leakage
    Next

    Top Causes of Data Leakage

    The most likely causes of data leakage are: inappropriate file sharing with others inside the organization, with those outside, and due to malware and hackers.
  • Previous
    Unprotected Files Leave Cloud-based Platforms
    Next

    Unprotected Files Leave Cloud-based Platforms

    90% of respondents said lack of protection of files leaving cloud-based platforms or device containers are the highest risk to adopting cloud-based file storage and collaboration services.
  • Previous
    Increased Training and Security Technology Purchases Planned
    Next

    Increased Training and Security Technology Purchases Planned

    Organizations expect to increase user awareness training and to purchase additional security technology to combat data leakage.
  • Previous
    Top Control Investments
    Next

    Top Control Investments

    Email Gateway/Proxy and Data Loss Prevention technologies are the top mature controls, while file encryption and usage control software are cited as the top upcoming control investment.
  • Previous
    Users Can Help If Empowered
    Next

    Users Can Help If Empowered

    70% of respondents believe users would use stronger security controls on files they share if they were empowered to do so.
  • Previous
    Best Way to Secure File Data
    Next

    Best Way to Secure File Data

    Respondents said the most significant issue for them is how to secure data leaving the cloud sharing repository and how to secure it once it leaves the container.
  • Previous
    Top Five Encryption Control Concerns
    Next

    Top Five Encryption Control Concerns

    Asked to identify their top concerns using file encryption, respondents indicated the following: Key Management: 86%, Encryption Strength: 85%, Impact to Data Recipients: 83%, Impact to Operational Workflows: 81%, Interoperability with Applications and Infrastructure: 81%
 

Eighty percent of respondents to a new survey know of data leakage incidents in their organizations, and while most have implemented technical controls and auditing, only 16% are highly confident in their file security investments. Consequently, there is a gap between file security policies and the efficacy of technical controls, including encryption, to monitor and enforce compliance. David Monahan, research director of Risk and Security Management at think-tank Enterprise Management Associates, said "This lack of capability to control unstructured data as it moves through its lifecycle will not only yield more data privacy breaches but will impact the adoption of advanced enterprise and cloud content management systems." The growth of cloud and mobile computing, ease of file sharing and collaboration methods, applications and devices all contribute to data leakage incidents, according to the report. Enterprise-grade file security firm FinalCode sponsored the survey, "State of File Collaboration Security," which EMA conducted in September. Respondents included 153 senior IT, information security and line-of-business professionals responsible for IT purchase decisions.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register