Survey: 85 Percent Of U.S. Organizations Hit By At Least One Data Breach In Last 12 Months

PGP Corp. recently announced the results from The Ponemon Institute's fourth annual study on encryption usage in the enterprise -- The 2009 Annual Study: U.S. Enterprise Encryption Trends.

This year's study surveyed 997 IT and security practitioners and identifies the trends in enterprise encryption planning strategies, budgeting and spending, deployment methodologies and impact on data breach incidents. While 78 percent of organizations have an encryption strategy in place and are moving toward a more consistent approach to data protection, data breaches continue to rise across the board. 85 percent of survey respondents experienced at least one data breach in the last 12 months, consistent with 84 percent in 2008, and the number of companies experiencing more than 5 data breaches in one year rose to 22 percent, up from 13 percent last year. For the first time, fifty-eight percent of the respondents reported that data protection is a very important part of their overall risk management. Additionally, as organizations increasingly rely on mobile technology and PDAs as their primary computing platform, 26 percent indicate they encrypt a smartphone or PDA most of the time, 51 percent said they never do.

"In our fourth year of conducting this study, we are consistently breaking new ground in identifying new data protection trends to help enterprises as they assess their risk posture," said Dr. Larry Ponemon, chairman and founder of The Ponemon Institute. "Organizations are looking for more complete solutions that can protect their data wherever it may reside. The focus for 2010 needs to be on applying a strategic approach to data security across the enterprise."

The following list summarizes key findings from the study that included nearly 1,000 U.S.-based enterprise IT leaders, analysts and executives:

  • Data protection is an important part of an organization's risk management efforts. For the first time, Ponemon asked how data protection relates to an organization's risk management efforts. Fifty-eight percent report that is a very important part of risk management and 22 percent say it is an important part.
  • Encryption of data on mobile data-bearing devices used by employees is very important or important. More than 59 percent of respondents say it is very important or important to encrypt employees' mobile devices -- a sign that organizations recognize that valuable data is more mobile than ever.
  • More than 70 percent have fully executed or just launched data encryption strategy in their organization. Once again data encryption strategies are being implemented across a majority of the respondent participants. The majority of organizations, 78 percent, have some type of encryption strategy, up from 74 percent in 2008 and from 66 percent in 2007.
  • Data breaches continue to be a huge problem: Eighty-five percent of organizations surveyed had had at least 1 data breach in the last 12 months, demonstrating that there is no let up in breaches as this is consistent with 84 percent sited in the 2008 report. Companies suffering more than 5 data breaches rose to 22 percent in 2009 up from 13 percent in 2008.
  • Encryption is mostly used to mitigate data breaches and comply with privacy and data protection regulations. In addition, there was an increase in the percentage of respondents who reported that encryption is also important to preserving brand and reputation.
  • The percentage of organizations using the platform approach to managing encryption solutions has increased. Additionally, 76 percent would strongly recommend or recommend the platform-based approach if it reduced the cost of acquiring, deploying and managing encryption applications.

"This year's research clearly demonstrates that compliance, breaches and brand damage are driving companies to deploy more data protection solutions," said Phillip Dunkelberger, president and CEO of PGP Corporation. "The risk migration goal is clear; take a more strategic approach to protect your data -- at rest, in motion and in use."

For more information or to receive a copy of this study, visit: http://www.encryptionreports.com.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.