Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    11 Data Issues That Keep IT Security Pros Up at Night

    By
    Chris Preimesberger
    -
    April 27, 2016
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      111 Data Issues That Keep IT Security Pros Up at Night

      11 Data Issues That Keep IT Security Pros Up at Night

      A new Ponemon study uncovers what’s really keeping IT security professionals up at night. Here are the key takeaways from the report.

      2Security Pros Don’t Know Where All Sensitive Data Is Located

      Security Pros Don't Know Where All Sensitive Data Is Located

      According to the report, 62 percent of surveyed security professionals are concerned over their inability to have complete visibility into where their organization’s sensitive or confidential data resides.

      3The Struggle to Quantify Risk of Sensitive Data

      The Struggle to Quantify Risk of Sensitive Data

      The lack of confidence in knowing the location of sensitive data is compounded by the fact that more than half of security professionals struggle to understand the true risk to data contained in databases, emails and files.

      4Data Breaches Top List of IT Security Risks

      Data Breaches Top List of IT Security Risks

      The consequence of not knowing the location and risk of sensitive data is that security professionals are unable to protect their organizations from data breaches. More than one-third of respondents cite data breaches as the top IT security risk facing their organization. Employee/user negligence is reported to be the second-biggest risk, while noncompliance and malware/advanced persistent threats are considered the least risky.

      5Automated Security Is on the Rise

      Automated Security Is on the Rise

      More than half of survey respondents reported that their companies are using automated solutions to discover sensitive data and protect it from a potential breach. Sixty-four percent say their automated solution is developed in-house, rather than provided by a third-party vendor. That is a surprisingly high number—to eWEEK at least.

      6Uncertainty Around What’s Actually Being Tracked

      Uncertainty Around What's Actually Being Tracked

      Although many organizations use automated solutions to gain visibility into user activity around sensitive data, nearly half of respondents admit they don’t actually know what is being tracked. Even among security professionals who do have this insight, there remains a discrepancy between what user activity is actually being tracked versus what should be tracked, particularly when it comes to privileged-user access, cross-border transfers, high-volume access and new proliferation of data.

      7Data Classification Tools Are Most Effective in Stopping Breaches

      Data Classification Tools Are Most Effective in Stopping Breaches

      Nearly three-quarters of respondents use data classification tools to improve data security. The most commonly used data classification tools are data monitoring (69 percent), followed by encryption or tokenization (61 percent) and data discovery (55 percent).

      8Commercial Solutions Don’t Address User Behavior Risks

      Commercial Solutions Don't Address User Behavior Risks

      While there are a seemingly endless number of security and risk management vendor solutions in the market, about two-thirds of respondents report difficulties finding commercial solutions that help mitigate behavioral risks such as employee/user negligence or malicious insiders. As a result, IT security teams either go without these protections or are forced to build them in-house.

      9Intelligence Analytics Increasingly Are Critical

      Intelligence Analytics Increasingly Are Critical

      When asked to predict the process-focused security controls that will be most relevant during the next three to five years, more than half of respondents named security intelligence analytics to identify risk and threats. Threat feeds and intelligence sharing (45 percent), advanced authentication and identification solutions (40 percent) and user provisioning and identity management (37 percent) are also noted as becoming increasingly critical.

      10Cloud Gateways Will Be Key in Coming Years

      Cloud Gateways Will Be Key in Coming Years

      Security professionals expect that cloud-service brokers and cloud application gateways (40 percent) and user awareness training (39 percent) will be the most relevant target-focused security controls in the coming years. Respondents also cite information protection and control (such as data loss prevention, tracking, masking and encryption) and database firewall/activity monitoring.

      11Threats, Budgets Drive Security Program Changes

      Threats, Budgets Drive Security Program Changes

      Sixty-seven percent of respondents say that changes to their organization’s IT security programs are dictated by immediate threats and vulnerabilities. The second-most common driver of change is budget and resource constraints.

      12Shadow IT Will Pose the Next Big Security Challenge

      Shadow IT Will Pose the Next Big Security Challenge

      According to respondents, over the next three to five years, the industry trends that will have the biggest impact on decisions related to their organization’s security programs are the consumerization of IT/shadow IT, mobility and increased sophistication of attackers.

      PrevNext
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×