Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 28 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Organisations a long way from plugging the gaps in their IT estate to prevent data leakage

by The Gurus
October 4, 2016
in Editor's News
Share on FacebookShare on Twitter

With more than 9 in 10 organisations reporting a data breach in the last five years, businesses need to rapidly put measures in place to prevent the loss of Personal Identifiable Information (PII), especially with the General Data Protection Regulation (GDPR) set to transform cyber security regulation in Europe with significant financial and legal (not to mention reputational) implications.

A recent report from Lloyd’s, on what European businesses are doing to tackle cyber security, shows that 92 per cent of organisations have suffered a data breach in the last five years, highlighting the increasing threat of data loss within organisations. What’s more, 57 per cent of businesses surveyed stated that they know “little” or “nothing” about the GDPR, despite the serious financial (with costs of up to 4 per cent of revenue) and legal repercussion of not complying with the regulations. With the introduction of the GDPR fast approaching, organisations must ensure they maintain strict control over their sensitive data, this includes securing their partners and automating their mailrooms.

Joe Doyle, Marketing Director of Annodata, commented: “In light of the mounting threats organisations face in today’s security landscape and with the deadline for compliance with the GDPR rapidly approaching, it’s vital for organisations to address the possibility of data leakage and security breaches so these pressures can be tackled effectively. Printer technology has advanced with the help of smartphones and tablets, leading to staff breaking free from their desktop computers. These mobile devices are now fully integrated within the IT estate of many organisations, affording broad functionality such as the ability to print from mobile devices and to scan to email and network drives. Although this new usability brings big benefits, new areas of vulnerability rise in parallel. As a result, it’s vital that organisations ensure they pay close attention to the security posture of their devices, data, network and internet-enabled printers.

“Businesses need to ensure they have a thorough awareness of where their data is and who has access to it. An increasing number of devices in the mix as well as ‘Bring Your Own Device’ (BYOD) adoption creates increasing complexity within organisations. As a result, it’s important to maintain a transparent view of which devices are accessing which systems and data. Not only this, but by introducing measures such as automated mailrooms and secure release printing, organisations can effectively guard against internal data leakage.

“One of the most critical components in mitigating the threat of data loss for organisations is ensuring they partner with a trusted cloud provider that can maintain the integrity of the data and service. Businesses must do their due diligence when making this choice by asking the right questions; where will the data be stored? Who has access to it? What security mechanisms are in place to protect it? What guarantees do I have about service delivery? What happens when I want to retrieve my data? Through an awareness of data backup, access restrictions and the other ins and outs of the service offering, organisations are able to partner securely and effectively with a provider that best reflects their interests, whilst also ensuring they have a secure framework in place,” concludes Doyle.

FacebookTweetLinkedIn
ShareTweet
Previous Post

75% of UK companies targeted by ransomware believe they will fall prey to the attack again

Next Post

A dating site leaked over a million accounts because of shoddy security

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information