Unstructured Data, Unending Security Concerns

Unstructured Data, Unending Security Concerns

Unstructured Data, Unending Security ConcernsUnstructured Data, Unending Security Concerns

IT pros are concerned that unstructured data moving through its lifecycle will yield more data privacy breaches and complicate advanced content management systems.

Widespread Concern About File Data Leakage RisksWidespread Concern About File Data Leakage Risks

All organizations surveyed are concerned about file data leakage risks, with 75% expressing high- to very-high concern.

Pervasive Low Confidence in Security ControlsPervasive Low Confidence in Security Controls

84% of respondents have moderate to no confidence in their security controls and auditing capacity to secure confidential files.

Majority Experience File Data LeakageMajority Experience File Data Leakage

80% of respondents have experienced file data leakage in their organizations. Half have had frequent incidents.

Top Causes of Data LeakageTop Causes of Data Leakage

The most likely causes of data leakage are: inappropriate file sharing with others inside the organization, with those outside, and due to malware and hackers.

Unprotected Files Leave Cloud-based PlatformsUnprotected Files Leave Cloud-based Platforms

90% of respondents said lack of protection of files leaving cloud-based platforms or device containers are the highest risk to adopting cloud-based file storage and collaboration services.

Increased Training and Security Technology Purchases PlannedIncreased Training and Security Technology Purchases Planned

Organizations expect to increase user awareness training and to purchase additional security technology to combat data leakage.

Top Control InvestmentsTop Control Investments

Email Gateway/Proxy and Data Loss Prevention technologies are the top mature controls, while file encryption and usage control software are cited as the top upcoming control investment.

Users Can Help If EmpoweredUsers Can Help If Empowered

70% of respondents believe users would use stronger security controls on files they share if they were empowered to do so.

Best Way to Secure File DataBest Way to Secure File Data

Respondents said the most significant issue for them is how to secure data leaving the cloud sharing repository and how to secure it once it leaves the container.

Top Five Encryption Control ConcernsTop Five Encryption Control Concerns

Asked to identify their top concerns using file encryption, respondents indicated the following: Key Management: 86%, Encryption Strength: 85%, Impact to Data Recipients: 83%, Impact to Operational Workflows: 81%, Interoperability with Applications and Infrastructure: 81%

Karen A. Frenkel
Karen A. Frenkel
Karen A. Frenkel is a contributor to CIO Insight. She covers cybersecurity topics such as digital transformation, vulnerabilities, phishing, malware, and information governance.

Latest Articles