Survey: Almost 20 Percent Of Companies Have Suffered Data Loss In Last 18 Months

When it comes to data security breaches, 78 percent of U.S. IT decision-makers feel that companies do not need to inform the general public, according to a recent survey by Clearswift.

While respondents felt the general public did not need to know (78 percent), they did indicate that affected customers and partners should be informed (95 percent) while less than half of them felt that industry regulators (42 percent) or even the police (35 percent) should be notified.

Of the U.S. organizations polled, 19 percent had suffered a data loss in the last 12-18 months, and of those, 50 percent had experienced more than one. Despite the fact that more than 89 percent of those surveyed said that data loss/data breach was a very important or critical issue to their organizations, the research indicated that they are still not locking down the transfer of sensitive information appropriately. E-mail is the most popular method of transferring confidential data (more than 70 percent allow staff to transfer confidential data via e-mail), and yet over a quarter of businesses (26 percent) admit to losing data via e-mail.

To counter the threat, 88 percent have security measures in place to prevent data breaches or data losses from happening. But 28 percent don’t have e-mail content filtering solutions in place, 24 percent don’t have Web content filtering in place and 24 percent don’t have encryption solutions in place. Moreover, 23 percent don’t have a policy on DLP and 10 percent didn’t even know if they had one.

“The survey shows that US businesses consider DLP as very important, but that much still needs to be done to address the issues. With unclear policies and laws that are not thorough or well publicized there is a long way to go before companies really reach the point where data loss protection is truly addressed,” said Mike Lisi, general manager, Americas for Clearswift. “The majority of the IT decision makers that we surveyed have both policies and security measures in place to prevent data beaches. While the majority are prepared, our research shows that when faced with the prospect of having to air some dirty laundry in public, companies are not always confident they will emerge in a positive light, and feel that potential legislation enforcing disclosure could be expensive and create significantly more work for the IT department.”

While the threat of data loss or breach continues to increase, there are still organizations that have not invested in data security. Respondents indicated the following as the top three reasons why:

  • 21 percent feel that data loss prevention is not a security threat.
  • 37 percent do not have the budget to invest in data loss prevention solutions.
  • 16 percent trust their employees to follow the corporate policy.

When asked about the possible impact of data breach notification legislation, 49 percent of respondents that do not currently adhere to data breach notification legislation envision their annual IT spend increasing by at least 10 percent. In comparison, only one in five (20 percent) respondents who currently adhere to data breach notification legislation said they have seen no change in their IT spending since the legislation's introduction.

Additionally 50 percent of IT managers expect any new data breach notification legislation to damage the reputation of their organization, while only 32 percent of respondents adhering to this legislation claimed to have suffered damage to their reputation. Only 11 percent felt that data breach notification legislation would positively impact their business while 31 percent of those currently adhering to legislation indicated the legislation has had neither a positive or negative impact.

“The exposure of confidential information is now the single greatest threat to enterprise network security, according to IDC's latest Security Survey,” said Brian Burke, program director at IDC. “However, the survey also showed that only 34 percent of organizations are currently budgeting for DLP solutions. The top barriers for DLP investment are lack of budget and the belief that solutions are too complex to manage.”

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3