Survey Highlights Serious Security and Compliance Problems

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Survey Highlights Serious Security and Compliance Problems-2 Next

IT managers face communications disconnect.

A telling sign of disconnect is the confidence respondents had in their company’s ability to pass a compliance audit: Non-IT employees are much more confident (65.2 percent are “very” confident) than those in IT management (46.6 percent). Both IT and non-IT respondents overwhelmingly said their companies have a process for updating and communicating security and compliance policies for transferring files electronically. Yet, a larger percentage of non-IT personnel (75.5 percent) versus IT management (61.9 percent) believe employees/coworkers fully understand these policies. While IT management takes a dimmer view on comprehension, on average, roughly one in three respondents felt employees/coworkers do not fully understand these policies. Also, 51.6 percent of IT management said free consumer-type file transfer services are forbidden at their companies – yet only 24 percent of non-IT workers agreed.

Email encryption provider, DataMotion, has released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT management and non-IT employees on security and compliance policies. Results also showed a disturbing percentage in IT management taking compliance risks. Additionally, the survey looked at such critical areas as the use of free consumer-type file transfer tools and corporate email on mobile devices. The survey polled more than 400 IT and business decision-makers, focusing on industries that deal with sensitive data and compliance regulations such as financial services, health care and government.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.