Security and Compliance: Violations and Lack of Confidence Are Widespread

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Security and Compliance: Violations and Lack of Confidence Are Widespread-4 Next

The ability to send sensitive information securely and compliantly via email is vital. Yet, despite growth in usage, survey data shows many companies are still lacking basic tools for secure data delivery.

  • 34.5 percent of respondents do not have the ability to encrypt email.
  • 28.9 percent said their company does not monitor the content of outbound email and file attachments for compliance purposes.
  • 42.5 percent are only “somewhat” confident in the technology their company uses for filtering outbound email and file attachments for compliance purposes, and an additional 3.8 percent are not confident at all.
  • 54 percent do not have a single tool for securely encrypting sensitive email and transferring files.

DataMotion, an innovator in cloud-based data delivery services, recently released research showing that despite having corporate security and compliance policies and solutions in place, there is a widespread lack of confidence among respondents in their effectiveness. According to survey findings, 84 percent of respondents believe employees/co-workers violate security and compliance policies for transferring files electronically and only 45.5 percent feel these policies are fully understood. Adding to respondents’ compliance woes, nearly one in three admit their company knowingly takes risks because they don’t have the resources to be totally compliant. Considering these results, it’s no surprise that only 37.5 percent of respondents state they are very confident that their organization would pass a compliance audit if selected.

Conducted by DataMotion, the survey polled more than 200 IT and business decision-makers across the U.S. and Canada to gain insight into corporate email and file transfer (FTP) habits. The survey particularly focused on those in industries that routinely deal with sensitive data and compliance regulations, such as financial services, healthcare and government.


Related Topics : Litigation, Consultants, Digital Rights Management, Environmental Regulations, External and Internal Audits

More Slideshows

Disaster10-190x128.jpg New Catalysts Driving Disaster Recovery Initiatives

Due to a variety of natural and manmade disasters – including cyber attacks – organizations are placing greater emphasis on DR initiatives. ...  More >>

Protiviti-GRCPlatform0x Real-World GRC Convergence: Platform Considerations

Achieving GRC convergence in the face of many obstacles requires technology capable of unifying an organization's policies, processes and infrastructure. ...  More >>

TufinContinuousCompliance0x 6 Steps for Ensuring Continuous Compliance in a Complex, Hybrid IT Environment

Even with the many challenges of managing today's complex IT environment, it's possible to achieve continuous compliance through proper organization, thorough processes and technology automation. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.