Survey: Almost 20 Percent Of Companies Have Suffered Data Loss In Last 18 Months

When it comes to data security breaches, 78 percent of U.S. IT decision-makers feel that companies do not need to inform the general public, according to a recent survey by Clearswift.

While respondents felt the general public did not need to know (78 percent), they did indicate that affected customers and partners should be informed (95 percent) while less than half of them felt that industry regulators (42 percent) or even the police (35 percent) should be notified.

Of the U.S. organizations polled, 19 percent had suffered a data loss in the last 12-18 months, and of those, 50 percent had experienced more than one. Despite the fact that more than 89 percent of those surveyed said that data loss/data breach was a very important or critical issue to their organizations, the research indicated that they are still not locking down the transfer of sensitive information appropriately. E-mail is the most popular method of transferring confidential data (more than 70 percent allow staff to transfer confidential data via e-mail), and yet over a quarter of businesses (26 percent) admit to losing data via e-mail.

To counter the threat, 88 percent have security measures in place to prevent data breaches or data losses from happening. But 28 percent don’t have e-mail content filtering solutions in place, 24 percent don’t have Web content filtering in place and 24 percent don’t have encryption solutions in place. Moreover, 23 percent don’t have a policy on DLP and 10 percent didn’t even know if they had one.

“The survey shows that US businesses consider DLP as very important, but that much still needs to be done to address the issues. With unclear policies and laws that are not thorough or well publicized there is a long way to go before companies really reach the point where data loss protection is truly addressed,” said Mike Lisi, general manager, Americas for Clearswift. “The majority of the IT decision makers that we surveyed have both policies and security measures in place to prevent data beaches. While the majority are prepared, our research shows that when faced with the prospect of having to air some dirty laundry in public, companies are not always confident they will emerge in a positive light, and feel that potential legislation enforcing disclosure could be expensive and create significantly more work for the IT department.”

While the threat of data loss or breach continues to increase, there are still organizations that have not invested in data security. Respondents indicated the following as the top three reasons why:

  • 21 percent feel that data loss prevention is not a security threat.
  • 37 percent do not have the budget to invest in data loss prevention solutions.
  • 16 percent trust their employees to follow the corporate policy.

When asked about the possible impact of data breach notification legislation, 49 percent of respondents that do not currently adhere to data breach notification legislation envision their annual IT spend increasing by at least 10 percent. In comparison, only one in five (20 percent) respondents who currently adhere to data breach notification legislation said they have seen no change in their IT spending since the legislation's introduction.

Additionally 50 percent of IT managers expect any new data breach notification legislation to damage the reputation of their organization, while only 32 percent of respondents adhering to this legislation claimed to have suffered damage to their reputation. Only 11 percent felt that data breach notification legislation would positively impact their business while 31 percent of those currently adhering to legislation indicated the legislation has had neither a positive or negative impact.

“The exposure of confidential information is now the single greatest threat to enterprise network security, according to IDC's latest Security Survey,” said Brian Burke, program director at IDC. “However, the survey also showed that only 34 percent of organizations are currently budgeting for DLP solutions. The top barriers for DLP investment are lack of budget and the belief that solutions are too complex to manage.”

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3