Survey Highlights Serious Security and Compliance Problems

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Survey Highlights Serious Security and Compliance Problems-3 Next

Email encryption and mobile devices.

Although 94.2 percent of IT management said mobile devices for corporate email are allowed, only 62 percent of non-IT personnel agreed – yet most still use these. Among organizations with email encryption capabilities, 44.4 percent still lack the ability to send and receive encrypted email from their mobile email client. Overall, only 44 percent of respondents said their company has a BYOD policy, even as 86.7 percent of these same organizations permit the use of mobile devices for email. And while 56.1 percent of IT management said they have a BYOD policy in place, 74.9 percent of non-IT employees say they either don’t or are unsure, another clear indication that policies are not being effectively communicated. 

Email encryption provider, DataMotion, has released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT management and non-IT employees on security and compliance policies. Results also showed a disturbing percentage in IT management taking compliance risks. Additionally, the survey looked at such critical areas as the use of free consumer-type file transfer tools and corporate email on mobile devices. The survey polled more than 400 IT and business decision-makers, focusing on industries that deal with sensitive data and compliance regulations such as financial services, health care and government.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.