Case Studies

Adoption of encryption

by Mark Rowe

Almost half of businesses worldwide have started using encryption technology to protect critical data, according to research from B2B International on behalf of IT security company Kaspersky Lab. The technology is now the fifth most widespread protection technique – a rise from the results of a similar survey in 2011 where it barely crept into the top ten. In effect, encryption is according to the IT product company the final defensive barrier: even after a criminal has successfully forced his way into the company’s IT infrastructure – this last hurdle makes it extremely difficult to get access to important information.

Despite an increase in the adoption of such technology, companies have still not fully introduced encryption, it is claimed, with many facing difficulties in implementing encryption systems. According to the B2B International survey, only one-third of specialists (36 per cent) use full disk encryption (also known as encryption of information arrays) and less than half of those specialists (44 per cent) actually protect critical information. Data encryption on external devices, such as USB drives, is used by 32 per cent.

Encryption of highly critical data ranks second among the security measures which companies want to develop, with only protection against malware scoring higher. However it is clear that businesses are facing difficulties in implementing encryption systems, which are notably absent from the top five protection measures used. These results show that companies require modern systems of information protection, which are both effective and simple to implement.

Nikolay Grebennikov, Chief Technology Officer, Kaspersky Lab said; “Encryption is among the most promising technologies for reducing the risk of critical data leakage, but it’s at its most effective when incorporated into a comprehensive security system for corporate IT infrastructure. Our business solutions can provide this comprehensive protection for all corporate network endpoints.”

Related News

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing