Survey: Companies Not Following Data Security Policies

Companies are not following simple data security procedures in seven high-risk scenarios, according to new research announced recently by the Ponemon Institute, a privacy and information management research firm. The report, Data Security Policies Are Not Enforced, was sponsored by RedCannon Security, a trusted provider of centrally managed, secure mobile-access solutions for the enterprise.

According to the study, 39 percent of employees surveyed said they have lost a PDA, cellular phone, USB memory stick, zip drive or laptop computer that contained sensitive or confidential business information, while, 56 percent believe their employer would never be able to determine the type of data contained on a lost device.

"Privacy and data protection policies are meaningless if they do not address the full spectrum of threats and if they are not enforced, and our research points to an urgent need to address this pervasive vulnerability in corporate data security programs," said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. "The development of comprehensive policies, along with training and stringent enforcement of those policies should be a priority in any enterprise-wide data security program."

Data Security Policies Are Not Enforced highlights: risks associated with the storage and transportation of confidential information, policies regarding lost portable devices, the lack of enforcement of existing policies concerning data security, and employees' lack of awareness about such policies. Only 10 percent of those surveyed said their organization has a policy to deal with the loss of a portable storage device containing sensitive information.

With today's technology, data is more portable than ever before. E-Mail, smartphones, MP3 players and USB memory sticks are all examples of the many ways data can be transported and viewed away from computers, creating big challenges for IT professionals trying to secure confidential and personal information. Derived from a survey of 893 IT professionals, the Data Security Policies Are Not Enforced reveals a number of key findings in reference to this problem, including:

                                              Evidence of non-compliance
                                              with a company's data security
  Seven survey scenarios  Experience rates    policy

  1. Copying confidential 51 percent do it.   87 percent believe that company's
  information onto USB                        policy forbids it.
  memory stick.

  2. Accessing Web-based  45 percent do it.   74 percent state there is no stated
  e-mail accounts from                        policy that forbids it.
  workplace computer.

  3. Losing a portable    39 percent          72 percent did not report lost or
  data-bearing device.    lost or misplaced   missing device immediately.
                          a portable
                          data-bearing
                          device.

  4. Downloading personal 45 percent do it.   60 percent state there is no stated
  software onto company                       policy that forbids it.
  assigned computer.

  5. Sending workplace    33 percent do it.   48 percent state they are unsure
  documents to home                           whether this violates policy.
  computer as an
  attachment in e-mail.

  6. Turning off security 17 percent do it.    80 percent are unsure whether this
  settings or firewall                         violates policy.
  on workplace computer.

  7. Sharing passwords    46 percent do it.    67 percent believe that company's
  with coworkers.                              policy forbids it.

"Data breaches remain the leading cause of financial losses in business, with more than 75 percent of Fortune 1000 companies falling victim to data leakage, and this is not going to change without improvements in the enforcement of data security policies," said Vimal Vaidya, founder and CEO at RedCannon. "This study clearly indicates key data management practices that have a serious impact on data security and regulatory compliance, and highlights ways organizations can bolster policy enforcement and reduce the risks of potential data loss."

The study offers insights into the challenges facing IT professionals trying to secure confidential data. It identifies problems with the current rules in effect at the workplace, as well as the problems with enforcement of those rules. Most importantly, it shows employee naivete towards this problem, with most staff members unaware of the rules in place, or uncaring due to lack of obvious consequences. The survey offers information on what is the most frequently lost portable storage device, the numbers of employees downloading personal software onto work computers, and statistics concerning how many portable devices that were lost had unprotected data on them, among other similarly invaluable information.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3