Nearly three-quarters of organizations believe they have adequate policies in place to protect sensitive, personal information, yet more than half have lost sensitive data within the past two years — and nearly 60% of those organizations acknowledge data loss as a recurring problem, according to findings of a global study released by Accenture.
The study — which surveyed more than 5,500 business leaders in 19 countries (28% came from Asia Pacific) — reveals a startling difference between organizations’ intentions regarding data privacy and how they actually protect sensitive personal information, such as name, address, date of birth, race, National ID/social security number and medical history. The study was conducted in conjunction with the Ponemon Institute, an independent privacy, protection and information security research firm.
“The volume of sensitive personal information being collected and shared by organizations has grown exponentially in recent years, making data protection a critical business issue and not just a technology concern,” said Alastair MacWillson, managing director of Accenture’s Security practice. “Our study underscores the importance of taking a comprehensive approach to data privacy and protection, one that closes the gaps between business strategy, risk management, compliance reporting and IT security.”
Fifty-eight% of business respondents have experienced at least one data security breach over the past two years, yet 73% said their organization has adequate policies to protect the personally identifiable information it maintains.
While 70% agreed that organizations have an obligation to take reasonable steps to secure consumers’ personal information, there are discrepancies in their commitments for doing so. For instance, 45% of respondents were unsure about or actively disagreed with granting customers the right to control the type of information that is collected about them.
The study also found that 47% were unsure about or disagreed with customers having a right to control how this information is used. Nearly half also did not believe it was important or very important to: limit the collection (47%) or sharing (46%) of sensitive personal customer information; protect consumer privacy rights (47%); prevent cross-border transfers of personal information to countries with inadequate privacy laws (47%); prevent cyber crimes against consumers (48%); or prevent data loss or theft (47%).
Underlying shifts in payload types and traffic patterns are restraining data center administrators from having pervasive network traffic visibility necessary for application performance monitoring (APM). Specifically, virtualization and...
Imagine being prompted to join a high-speed Wi-Fi network at a hospital. You install and open a healthcare app on your smartphone. The app automatically completes your check-in and confirms your appointment. Based on your mobile device’s...
IT security professionals know that it’s no longer a matter of “if” your network will become compromised, but “when.” A research study between October 2013 and March 2014 indicates that 97% of the organizations...
LEAF Commercial Capital used to wrestle with tape backups for disaster recovery. Now the equipment leasing and finance company is using a software-based service from Evolve IP for disaster recovery. Rusty Lorenzon, director of IT Infrastructure...
With a growing number of professionals working outside the main office at least some of the time, the use of remote working tools has also radically increased. In fact, a staggering 86% of workers had used at least one tool enabling remote working...
Most organizations recognize the benefits of moving to cloud-managed services like Office 365 and Amazon Web Services. A 451 Research study found that 72% of respondents expect to put more than half of their workloads, including Software-as-a-...
If I asked you to come up with a single word summarizing 2014 IT security, it might just be breach. It seems like we heard about one attack after another last year, mostly involving major brands. Between the frequency of the breaches and...
Forget viewing yourself as a cloud services broker. In today's hybrid cloud enterprise the CIO's truly high value role is the creation of seamless business flows that bridge cloud and on-premisec infrastructure to help the business operate...