Welcome!

Artificial Intelligence Authors: Pat Romanski, Yeshim Deniz, Liz McMillan, Elizabeth White, Zakia Bouachraoui

News Feed Item

Study Finds Protecting Credit Card and Patient Data Drives IT Spending Yet Most Organizations Still at Risk

Less than half encrypt backup tapes, full disks and databases while nearly 20 percent said they would wait for a data breach before they encrypt tapes

SAUSALITO, Calif., Oct. 20 /PRNewswire/ -- Trust Catalyst, a research firm helping companies build data protection strategies that strengthen customers' trust -- today announced the findings of its second annual 2009 Encryption and Key Management Benchmark Report which surveyed more than 600 IT security professionals and was sponsored by Thales.

The study found 41 percent surveyed encrypt backup tapes, 43 percent encrypt databases and 49% encrypt full disks, despite the growing number of new industry, state and national data protection regulations. While participants indicated the protection of health care and credit card data was driving future IT spending, 19 percent said they would wait for a data breach before they would encrypt tapes. This data left unprotected in databases and backup tapes causes these organizations to be at higher risk for a data breach.

The study revealed the primary obstacles preventing organizations from encrypting these applications were due to concerns about cost and data availability. Once data is encrypted, participants fear they could lose this data or it would not be available when it was needed causing a business disruption even though twice as many surveyed admitted to a data breach than losing data because of a lost encryption key.

"Given the nature of new data breach regulations, organizations no longer have the luxury of time to wait and encrypt credit card and healthcare data because of data availability concerns," said Kimberly Getgen, Principal of Trust Catalyst. "With less than 50 percent of participants encrypting backup tapes and nearly 20 percent of respondents saying it would take the pain of a data breach to get their organization to reverse their decision, too many organizations, customers and patients are needlessly at risk."

Here are some of the study's key findings:

  • Patient and Credit Card Data Protection Drives IT Budgets. 53.9 percent indicated they were allocating budget for PCI DSS, 28.9% for HIPAA and 22.4% for the EU Data Privacy Directive. HIPAA was the number one allocator of new budgets for US participants.
  • Cost of encryption remains top concern. Participants express that cost remains the single most important factor preventing data that "should" be encrypted from being encrypted. Over half cited the cost of the encryption solution (26%) or the cost of managing the encryption solution (25%) as their primary obstacles for being able to bring encryption into their organizations where it is needed most.
  • Operational concerns delaying encryption projects. The decision to postpone encryption is often because operational efficiencies like availability of data and performance are seen as more important than data protection. For example, when asked specifically about what was preventing them from encrypting databases, it was the complexity of managing keys that was identified as the primary obstacle preventing participants from encrypting backup tapes (24%). Here, participants said availability was far more important than confidentiality.
  • Cloud computing not ready for prime time. 52.1 percent of participants cite data security concerns as being the number one barrier preventing their organization from adopting cloud computing. 42.6 percent of survey participants said they were not currently planning on moving to the cloud while another 46.5% said they would wait until data is encrypted before moving. 58.8 percent said they would want to manage their own encryption keys if encrypted data was moved to the cloud.

The full 2009 Encryption and Key Management Benchmark report can be downloaded from http://www.trustcatalyst.com/2009EncryptionSurvey.php

About Trust Catalyst

Trust Catalyst helps global organizations make critical decisions about how to protect their most valuable resource - their customer's trust. We understand that the adoption of a successful data protection or security program is about selling a strategy to a larger audience. We speak the language business executives understand and quantify the need for security by helping establish the costs of lost customer trust and the disruption to business when that trust is broken. As more insidious attacks from cybercriminals specifically targeting organizations with customer's sensitive data grows, we help businesses understand the threats, the costs of the threats and how to maintain trusted relationships with their customers. You can learn more and download our research at www.trustcatalyst.com

SOURCE Trust Catalyst

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
Apptio fuels digital business transformation. Technology leaders use Apptio's machine learning to analyze and plan their technology spend so they can invest in products that increase the speed of business and deliver innovation. With Apptio, they translate raw costs, utilization, and billing data into business-centric views that help their organization optimize spending, plan strategically, and drive digital strategy that funds growth of the business. Technology leaders can gather instant recomm...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...