Survey Highlights Serious Security and Compliance Problems

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Survey Highlights Serious Security and Compliance Problems-2 Next

IT managers face communications disconnect.

A telling sign of disconnect is the confidence respondents had in their company’s ability to pass a compliance audit: Non-IT employees are much more confident (65.2 percent are “very” confident) than those in IT management (46.6 percent). Both IT and non-IT respondents overwhelmingly said their companies have a process for updating and communicating security and compliance policies for transferring files electronically. Yet, a larger percentage of non-IT personnel (75.5 percent) versus IT management (61.9 percent) believe employees/coworkers fully understand these policies. While IT management takes a dimmer view on comprehension, on average, roughly one in three respondents felt employees/coworkers do not fully understand these policies. Also, 51.6 percent of IT management said free consumer-type file transfer services are forbidden at their companies – yet only 24 percent of non-IT workers agreed.

Email encryption provider, DataMotion, has released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT management and non-IT employees on security and compliance policies. Results also showed a disturbing percentage in IT management taking compliance risks. Additionally, the survey looked at such critical areas as the use of free consumer-type file transfer tools and corporate email on mobile devices. The survey polled more than 400 IT and business decision-makers, focusing on industries that deal with sensitive data and compliance regulations such as financial services, health care and government.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.