That’s a big number.
As a customer of some businesses and an owner of a business, it may give you a great shock to find out that 52% of this information was customer information. As employees start using multiple devices that are not monitored by the company’s IT department for work (iPhones, iPads, Androids), this data is exposed to harm more often than ever before.
Customer information was the most common type of data to be compromised in UK businesses
Three-quarters (75%) of UK organisations experienced data loss in 2010, a little lower than the global average of 77%, according to a survey conducted by Check Point and Ponemon Institute.
The survey ‘Understanding Security Complexity in 21st Century IT Environments’ revealed that customer information was the most common type of data to be compromised in UK businesses at 52%. Intellectual property (36%), employee information (36%) and consumer information (35%) were the other top stolen data.
In addition, with the adoption of Web 2.0 apps and more mobile devices connecting to the network, organisations are challenged with enforcing better data security and IT Governance, Risk and Compliance (GRC) requirements.
450 IT managers were surveyed. The majority of them believed that their employees had little understanding of data security, but they had been unable to control automatic backups for their employees.
According to the survey of approximately 450 IT security administrators in the UK, the primary cause for data loss was from lost or stolen equipment, cited by 35% of the UK respondents.
Network attacks accounted for a quarter, followed by Web 2.0 and file-sharing applications (22%), and unencrypted USB or media storage devices (19%).
The survey showed that more than half (53%) of UK respondents believe their employees have little or no awareness about data security, compliance and policies, with only 19% reporting high awareness of these issues – the third lowest of the five countries surveyed (UK, USA, France, Japan, Australia).
Check Point Software Technologies network security products vice-president Oded Gonda said data security and compliance are often at the top of the CISO’s list.
“However, if you look at the drivers for data loss, the majority of incidents are unintentional,” Gonda said.
“In order to move data loss from detection to prevention, businesses should consider integrating more user awareness and establish the appropriate processes to gain more visibility and control of information assets.”
Read the entire article at CBR Online.
Business data does not need to be this vulnerable. Cloud backup is secure and cost efficient and can be set up to run automatically and continuously. Don’t let laptop fleets, workstations, and mobile devices remain vulnerable. Get a competitive advantage and institute a complete, encrypted cloud backup program.