TESTIMONIALS

โ€œReceived the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.โ€

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Interviews

Access hindered

by Mark Rowe

According to research, while 85pc of employees say that security has added value to their company, half of employees say their job is hindered because they arenโ€™t getting access to all the information they need. With over half of respondents working for large organisations – the majority employing more than 5,000 people – employees are faced with a no-win situation. Forty percent of those questioned report simply giving up, resulting in lost sales opportunities, while a resilient 46pc are pressured into circumventing security controls to close an opportunity. This is according to the research by Voltage Security, a data-centric security firm.

According to the study pressure on companies to access information to get their job done is dividing the workforce. While 40pc of companies have lost a sales opportunity because employees werenโ€™t able to access the information they needed, 46pc avoided the possibility of losing a sales opportunity by bypassing security controls to access necessary sensitive information to get the job done.

The findings highlight the need for companies to strike a balance that allows employees to get to the data they need without compromising security by exposing sensitive information to the wrong people. With regards to security, the findings revealed a paradox: while 29pc of organisations would notice within seconds or minutes if sensitive data wasnโ€™t secured, 40pc would never notice. This is even more alarming according to Voltage as more than half of respondents stated they had access to financial, customer or HR information they didnโ€™t really need – putting potentially sensitive information at risk.

โ€œIt is safe to assume that with the majority of people working for major organisations with more than 5,000 employees, the loss of a single deal can be detrimental to business and may well cause millions in damage,โ€ said Dave Anderson, senior director, marketing, at Voltage Security. โ€œThe results show that organisations employ an array of restricting security tools that struggle to make data available to the right people, though the fundamental issue of security remains. Protecting sensitive data is the key requirement. Security can, and should be, seamlessly integrated into current business processes, rather than stand-alone functions that enable employees to protect information at all times. Deploying a data-centric framework will enable companies to protect sensitive information at all times, while still allowing employees to access, use, and move the data within the enterprise as needed to perform their duties.โ€

Anderson recommends the following steps to make sure companies can best protect their data while still ensuring it can be accessed and moved with the organisation as needed:

1. Think about a data-security strategy, not a security strategy based on only protecting a device, server, tape, disk, or media. This helps ensure any sensitive data can be protected anywhere it moves, and any way it is used.

2. Focus on integrating the core data protection functions, including encryption, tokenization and data masking capabilities, across a single vendor solution. Individual point products that are not integrated can be difficult to deploy and manage, and this is often where control gaps are found.

Implement data protection solutions that comprehensively protect all structured and unstructured data types across the entire IT infrastructure, including everything from legacy and mainframe, to data in the cloud and on mobile. Only protecting a single data type or a limited number of applications can leave an organisation.

Related News

  • Interviews

    Scenarios versus impact

    by Mark Rowe

    The core aim of Business Continuity Planning is to ensure that an organisation can continue to deliver its products and services, minimise…

  • Interviews

    From likes to leaks

    by Mark Rowe

    Simon Yeoman, CEO at Fasthosts, an internet service provider, outlines five ways to protect businesses against online threats through social media accounts.…

  • Interviews

    Election insecurity

    by Mark Rowe

    David Critchley, Regional Director of UK and Ireland at the cyber platform Armis draws insights from new research to showcase the risk…