Security and Compliance: Violations and Lack of Confidence Are Widespread

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Security and Compliance: Violations and Lack of Confidence Are Widespread-3 Next

Consumer-based applications for sharing files often have weak security and IT administrative controls, leading to potential data leakage and serious risks with sensitive information if used in the workplace. Despite this:

  • 34.2 percent of respondents have used, or recommended that others use, free consumer-type file transfer services such as YouSendIt, Dropbox, iCloud, etc. for work purposes.
  • 43.4 percent stated their company does not forbid the use of free consumer-type file transfer services.
  • 52 percent said their company does not block the URLs to free consumer-type file transfer services.

DataMotion, an innovator in cloud-based data delivery services, recently released research showing that despite having corporate security and compliance policies and solutions in place, there is a widespread lack of confidence among respondents in their effectiveness. According to survey findings, 84 percent of respondents believe employees/co-workers violate security and compliance policies for transferring files electronically and only 45.5 percent feel these policies are fully understood. Adding to respondents’ compliance woes, nearly one in three admit their company knowingly takes risks because they don’t have the resources to be totally compliant. Considering these results, it’s no surprise that only 37.5 percent of respondents state they are very confident that their organization would pass a compliance audit if selected.

Conducted by DataMotion, the survey polled more than 200 IT and business decision-makers across the U.S. and Canada to gain insight into corporate email and file transfer (FTP) habits. The survey particularly focused on those in industries that routinely deal with sensitive data and compliance regulations, such as financial services, healthcare and government.

 

Related Topics : Litigation, Consultants, Digital Rights Management, Environmental Regulations, External and Internal Audits

 
More Slideshows

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Disaster10-190x128.jpg New Catalysts Driving Disaster Recovery Initiatives

Due to a variety of natural and manmade disasters – including cyber attacks – organizations are placing greater emphasis on DR initiatives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.