Security and Compliance: Violations and Lack of Confidence Are Widespread

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Security and Compliance: Violations and Lack of Confidence Are Widespread-4 Next

The ability to send sensitive information securely and compliantly via email is vital. Yet, despite growth in usage, survey data shows many companies are still lacking basic tools for secure data delivery.

  • 34.5 percent of respondents do not have the ability to encrypt email.
  • 28.9 percent said their company does not monitor the content of outbound email and file attachments for compliance purposes.
  • 42.5 percent are only “somewhat” confident in the technology their company uses for filtering outbound email and file attachments for compliance purposes, and an additional 3.8 percent are not confident at all.
  • 54 percent do not have a single tool for securely encrypting sensitive email and transferring files.

DataMotion, an innovator in cloud-based data delivery services, recently released research showing that despite having corporate security and compliance policies and solutions in place, there is a widespread lack of confidence among respondents in their effectiveness. According to survey findings, 84 percent of respondents believe employees/co-workers violate security and compliance policies for transferring files electronically and only 45.5 percent feel these policies are fully understood. Adding to respondents’ compliance woes, nearly one in three admit their company knowingly takes risks because they don’t have the resources to be totally compliant. Considering these results, it’s no surprise that only 37.5 percent of respondents state they are very confident that their organization would pass a compliance audit if selected.

Conducted by DataMotion, the survey polled more than 200 IT and business decision-makers across the U.S. and Canada to gain insight into corporate email and file transfer (FTP) habits. The survey particularly focused on those in industries that routinely deal with sensitive data and compliance regulations, such as financial services, healthcare and government.

 

Related Topics : Litigation, Consultants, Digital Rights Management, Environmental Regulations, External and Internal Audits

 
More Slideshows

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Disaster10-190x128.jpg New Catalysts Driving Disaster Recovery Initiatives

Due to a variety of natural and manmade disasters – including cyber attacks – organizations are placing greater emphasis on DR initiatives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.