SHARE
Facebook X Pinterest WhatsApp

Unstructured Data, Unending Security Concerns

Jan 4, 2016

Unstructured Data, Unending Security Concerns

Unstructured Data, Unending Security ConcernsUnstructured Data, Unending Security Concerns

IT pros are concerned that unstructured data moving through its lifecycle will yield more data privacy breaches and complicate advanced content management systems.

Widespread Concern About File Data Leakage RisksWidespread Concern About File Data Leakage Risks

All organizations surveyed are concerned about file data leakage risks, with 75% expressing high- to very-high concern.

Pervasive Low Confidence in Security ControlsPervasive Low Confidence in Security Controls

84% of respondents have moderate to no confidence in their security controls and auditing capacity to secure confidential files.

Majority Experience File Data LeakageMajority Experience File Data Leakage

80% of respondents have experienced file data leakage in their organizations. Half have had frequent incidents.

Top Causes of Data LeakageTop Causes of Data Leakage

The most likely causes of data leakage are: inappropriate file sharing with others inside the organization, with those outside, and due to malware and hackers.

Unprotected Files Leave Cloud-based PlatformsUnprotected Files Leave Cloud-based Platforms

90% of respondents said lack of protection of files leaving cloud-based platforms or device containers are the highest risk to adopting cloud-based file storage and collaboration services.

Increased Training and Security Technology Purchases PlannedIncreased Training and Security Technology Purchases Planned

Organizations expect to increase user awareness training and to purchase additional security technology to combat data leakage.

Top Control InvestmentsTop Control Investments

Email Gateway/Proxy and Data Loss Prevention technologies are the top mature controls, while file encryption and usage control software are cited as the top upcoming control investment.

Users Can Help If EmpoweredUsers Can Help If Empowered

70% of respondents believe users would use stronger security controls on files they share if they were empowered to do so.

Best Way to Secure File DataBest Way to Secure File Data

Respondents said the most significant issue for them is how to secure data leaving the cloud sharing repository and how to secure it once it leaves the container.

Top Five Encryption Control ConcernsTop Five Encryption Control Concerns

Asked to identify their top concerns using file encryption, respondents indicated the following: Key Management: 86%, Encryption Strength: 85%, Impact to Data Recipients: 83%, Impact to Operational Workflows: 81%, Interoperability with Applications and Infrastructure: 81%

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.