Top Five Industries Impacted by Data Encryption Challenges in 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Top Five Industries Impacted by Data Encryption Challenges in 2014-5 Next

Energy & utilities

The major risk factors of an energy and/or utilities data breach are unique compared to other highly vulnerable industries.  A recent study from the Ponemon Institute found that while 75 percent of energy and utility companies had experienced a data breach in the last 12 months, an astounding 71 percent of IT security professionals surveyed said that "the management team in their organization does not understand or appreciate the value of IT security.” The same study found that 67 percent of energy and utility organizations aren't using "state of the art" technology to stop attacks against supervisory control and data acquisition (SCADA) systems, and 41 percent said their approach to SCADA security wasn't at all proactive. Companies need to ensure that the most up-to-date encryption solutions are being implemented to avoid any drastic ramifications that may result from a breach in this vertical.

According to Big Data security experts Gazzang, 2014 will be the year of data security. Between the Edward Snowden NSA leak and the hundreds of other data breaches that occurred in 2013, companies and consumers alike are beginning to take responsibility for their data and implementing encryption policies and solutions to prevent these kinds of breaches from occurring.

Though this is a step in the right direction, some of the most destructive and dangerous industries for a data breach to occur in are the ones who are expected to face the most challenges with data encryption in 2014. Disk encryption provider WinMagic reveals the top five industries that will experience the most data encryption challenges in 2014 and why the most dangerous industries remain the most vulnerable.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.