Top Five Industries Impacted by Data Encryption Challenges in 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Top Five Industries Impacted by Data Encryption Challenges in 2014-5 Next

Energy & utilities

The major risk factors of an energy and/or utilities data breach are unique compared to other highly vulnerable industries.  A recent study from the Ponemon Institute found that while 75 percent of energy and utility companies had experienced a data breach in the last 12 months, an astounding 71 percent of IT security professionals surveyed said that "the management team in their organization does not understand or appreciate the value of IT security.” The same study found that 67 percent of energy and utility organizations aren't using "state of the art" technology to stop attacks against supervisory control and data acquisition (SCADA) systems, and 41 percent said their approach to SCADA security wasn't at all proactive. Companies need to ensure that the most up-to-date encryption solutions are being implemented to avoid any drastic ramifications that may result from a breach in this vertical.

According to Big Data security experts Gazzang, 2014 will be the year of data security. Between the Edward Snowden NSA leak and the hundreds of other data breaches that occurred in 2013, companies and consumers alike are beginning to take responsibility for their data and implementing encryption policies and solutions to prevent these kinds of breaches from occurring.

Though this is a step in the right direction, some of the most destructive and dangerous industries for a data breach to occur in are the ones who are expected to face the most challenges with data encryption in 2014. Disk encryption provider WinMagic reveals the top five industries that will experience the most data encryption challenges in 2014 and why the most dangerous industries remain the most vulnerable.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.