Survey Highlights Serious Security and Compliance Problems

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Survey Highlights Serious Security and Compliance Problems-7 Next

What to do?

According to DataMotion CTO Bob Janacek; “There’s always a demand for new tools such as email on mobile devices, companies and employees look for better ways to get the job done. The challenge is to provide encryption and filtering tools that are easy for people to use, and dependable so they don’t get disabled. IT also has to keep pace, which is why the communications disconnect with non-IT employees, and risks being taken, require immediate attention. Also, regulatory developments in many industries have expanded; companies not previously impacted, might be now. C-level executives should take notice of these findings. Hopefully, this will help businesses anticipate and overcome issues, especially in an age where security and compliance can dramatically impact the bottom line.”

Email encryption provider, DataMotion, has released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT management and non-IT employees on security and compliance policies. Results also showed a disturbing percentage in IT management taking compliance risks. Additionally, the survey looked at such critical areas as the use of free consumer-type file transfer tools and corporate email on mobile devices. The survey polled more than 400 IT and business decision-makers, focusing on industries that deal with sensitive data and compliance regulations such as financial services, health care and government.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.