The True Cost of Compliance

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Previous The True Cost of Compliance-1 Next

Click through for results from a survey on the true cost of compliance, conducted by The Ponemon Institute on behalf of Tripwire.

More than a few IT organizations approach anything to do with compliance as something that requires the bare minimum effort.

But a new survey of 160 information security experts working at 46 multinational companies, conducted by The Ponemon Institute on behalf for Tripwire, a provider of compliance management tools, finds that the companies that proactively manage compliance wind up paying a lot less over the long term than those that treat compliance as a cost to be avoided.

While no one can guarantee that their company will not be subjected to compliance-related penalties, the survey data shows that doing the bare minimum is roughly the equivalent of an invitation to financial disaster.

More Slideshows:

2010 Security Threats in Review 2010 was a year full of security-related events of all shapes and sizes.

Why IT Projects Fail Recognize the early warning signs of imminent project failure.

15 Hot Business Apps for Your Mac Check out these hot business apps from the Mac App Store.


Related Topics : Data Loss Prevention, Decision Support Systems, e-Commerce, Power Supplies, Privacy

More Slideshows

Security103-290x195.jpg How Self-Encrypting SSDs Enhance Data Security

Hardware-based encryption is a much stronger and more reliable option for protecting data than software-based encryption or, worst case scenario, no encryption at all. ...  More >>

infra68-190x128 How to Mitigate the Risk of Data Loss and Disruption in 2016

What can SMB IT pros do to prevent data and financial loss heading into 2016? They must prepare their IT plans ahead of time. ...  More >>

WatchfulSoftwareDLPChallenges0x Data Loss Prevention: 5 Reasons You Need to Step Up Your Game

Sensitive content can be tricky for DLP solutions to identify after it's been saved or sent, as it may contain encryption, common words, vague patterns, or inexact input or context. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.