Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 30 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Business leaders revealed as biggest risk to information confidentiality and IP integrity in mid-market companies

by The Gurus
September 12, 2016
in Editor's News
Share on FacebookShare on Twitter

Although they handle their organisation’s most confidential and sensitive information, mid-market MDs and CxOs could be the weakest link when it comes to safeguarding that information. Research into information management and security practices in the mid-market commissioned by leading storage and information management company Iron Mountain (NYSE: IRM) suggests that business leaders are the worst offenders when it comes to mismanaging sensitive business information.
Over half (57%) the CxOs/MDs questioned say they have left business-sensitive or confidential information on the printer for all to see: just under half (49%) have used a personal email account to send sensitive business information; 40% have sent information over an insecure wireless network; 43% have disposed of documents in a potentially insecure bin, and 39% admit to having lost business information in a public place. In comparison to employees across all levels of mid-market companies, CxOs topped the list of information-management sinners in all of these instances.
According to the 2016 Edelman Trust Barometer report[1], which questioned 33,000 members of the general public in 28 countries, trust in CEOs around the globe has risen 8 per cent since 2015 to 49 per cent. This trust could, however, be misplaced when it comes to CxOs’ ability to safeguard company information. Indeed, when it comes to following processes designed to protect the integrity of information, ensure it is managed securely and remains compliant with company policies and/or legal requirements, one in five (21%) CxOs responding to the Iron Mountain research say the find the processes too complex and look for a workaround. A further one in seven (14%) don’t follow company policies governing information security because they find the policies too complicated, while 6% say they are completely unaware of any policies in this area.
The research shows that facilities and office managers come a close second to CxOs in their data handling bad habits, with over half (56%) admitting to taking sensitive or confidential information out of the workplace and 48% having sent such information to the wrong recipient.
At the other end of the scale, administrative staff rate well in comparison, but are still guilty of mismanaging information. Just under a third (29%) have left confidential information on the printer, one in five (21%) admit to having mislaid data or sending it to the wrong person and 15% admit to losing company documents in a public place.
Commenting on the research, Elizabeth Bramwell, Commercial Director at Iron Mountain UK, said: “Our research shows that business leaders in the mid-market are more likely to put sensitive information at risk than any other employee. They tend to bypass the very protocols designed to keep information secure. Given the potential consequences, this is concerning. The financial penalties for companies who fail to meet data handling and security obligations are getting more severe. But getting it right is not just about avoiding fines; the reputational damage associated with a data breach can erode customer loyalty and impact the bottom line. With the stakes so high, companies need to put the policies and processes in place to support good information governance. On its own this may not be enough: companies must promote behaviours that protect sensitive company information. For many, this will require a cultural shift, with the example set at the very top. Unfortunately, it would appear that many mid-market companies are falling woefully short of what is required.”
[1] Edelman Trust Barometer 2016

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Gugi Banking Trojan Outsmarts New Android 6 Security

Next Post

Russians hacked voter registration databases in 2 USA states

Recent News

cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information