How to Effectively Address Privacy Concerns

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Previous Next

Click through to gain a better understanding of the issues surrounding privacy, as well as steps organizations can take to mitigate the risks and impacts associated with these concerns.

Survey after survey shows it: Both consumers and employees question privacy on enterprise networks. For example, TRUSTe, a global data privacy management company, found that consumer trust has hit a three-year low. A GFI Software survey found that employees worry about identity theft within their company.

However, while the concerns themselves aren't new, the survey results are showing a new trend, said Barry Shteiman, director of Security Strategy at Imperva:

This new awareness is because many breaches in the past two years have resulted in the leakage of private information, and for that reason it became top-of-mind. However, this is a problem that has existed since the birth of data systems decades ago. That being said, the concern is real – breaches that risk business and private user information, such as their Social Security numbers, credit card information and other details create the risk of identity theft, and financial loss.

It isn't just breaches that are the problem, Renee Bradshaw, senior solutions manager at NetIQ, added:

With the hyper-focus on the NSA spying scandal, the Target breach, and most recently, the Heartbleed bug, it's no wonder that many Americans are very concerned about data privacy. The prospect of having your most private information bared for all to see, or of having your personal wealth plundered by the "bad guys," has become a real possibility – a part of public consciousness. Understandably, there is fear, and not without merit.

Now that consumers and employees are both growing more vocal about the risks involved, it is time for enterprise to start understanding how data leaks occur and addressing privacy concerns.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

CyphortSecurityParadigm0x Don't Let the IT Security Paradigm Shift Leave You Stranded

While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape. ...  More >>

AlientVaultMSSPMistakes0x Five Mistakes Managed Security Service Providers Should Avoid

MSSPs are at an exciting point where market acceptance, awareness and demand have converged. However, excitement and the prospect of profits can create haste, and with haste comes an increased risk of mistakes. ...  More >>

ITCareers34-190x128 Data Protection: Five Challenges Facing the Enterprise HR Department

HR departments are faced with unique security challenges - securing the flow of PII as well as sharing policies and inter-office communications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date