How Safe is Your Data?

How Safe is Your Data?

Today, more than ever before organizations spend millions of dollars to keep their networks and data safe. Corporations invest in monitoring tools and endpoint protection system to prevent breaches inside their networks. However, not all corporate data is safe once it leaves the protection of their firewalls. Once the data leaves your building it is exposed to seen and unseen threats. In the modern-day work environment more employees work from remote locations and at home. Mobile devices used in the corporation today carry sensitive corporate data and are a prime target for theft and data breaches.

What Are The Risks Associated With Corporate Data Once It Leaves Your Office?

1. Corporations rely on the mobile workforce

Today, the mobile workforce makes up 75 percent of the company's employees. The average employee uses more than three devices at a time to connect to company’s networks. More than 70 percent of employees’ personal mobile devices access corporate data.

2. Corporate employees access sensitive data on the go

Today, more than 70 percent of corporate employees don’t work in an office anymore. Most employees work from multiple locations and only telecommute once a week. Your mobile employees need to access data just like your office employees. Therefore, 81 percent of the corporation’s employees access their data on the go.

3. Employees use unauthorized free file sharing service to share work related documents

Most companies think that hackers are the number one cause of data breaches. Although, hackers count for a major percentage of corporate data breaches, but 36 percent of data breaches come from employees’ misuse. Seventy-seven percent of companies have strict data policies prohibiting employees from using on-line sharing services. Reports indicate that 72 percent of corporate employees use on-line sharing services. Only 32 percent of the corporations surveyed took steps to ensure their employees didn’t mishandle corporate information.

4. Corporate or BYOD laptops are stolen containing critical data

Laptops and mobile devices put corporate data at risk. Reports indicate that one laptop is stolen every 53 seconds and one out of 10 laptops is lost or stolen. More than 70 percent of corporate laptops are not encrypted nor have a means to remotely wipe the hard drive if lost or stolen. Considering the amount of data stored on the company’s laptops, more than half of the stolen laptops count for corporate data breaches.

5. In the next three years laptop and Smartphone usage will triple for corporations

Smartphone and tablet theft is worse for a corporation than laptop theft. Studies show that 90 percent of employees working in the U.S. use their own Smartphone at work. Also, 43 percent of corporate executives now use company or personal tablets for their job. In the next three years the use of tablets for corporations will triple and increase the endpoints that will be breached for companies.

6. Cell phone theft has increased since 2007

In America 1.3 billion Smartphones are stolen each year. Since 2007 cell phone theft has increased 40 percent, which means that ever 3.5 seconds a cell phone is stolen. What worries corporations are that 65 percent of the phones stolen can’t be remotely wiped. Another 43 percent of the phone wasn’t password protected. More than 76 percent of companies don’t encrypt their Smartphones. This could be the last measure to protect corporate data.

7. Businesses need to understand how much regulated data they store on mobile devices

IT department has a hard time governing corporate data stored on mobile devices. Most IT department doesn’t know how much regulated data are stored on employees’ endpoint devices. It is estimated that 81 percent of corporations have no idea how much regulated data their employees store on their mobile devices. Also, only 16 percent of corporations know how much regulated data is stored in their cloud-based file-sharing apps.

8. CIOs is unsure their mobile security policies would satisfy an auditor

If an audit was to take place in your business most companies would fail. Seventy-two percent of all corporate IT pros can’t detect if employees are using secure or insecure endpoint devices. Furthermore, only 28 percent of corporate CIOs think that their security policies would pass an auditor. Another 40 percent of IT pros have no idea if company employees follow their organization’s policies when accessing and using regulated data on their endpoint devices. However, 51 percent of corporations are confident that they preserve their data on mobile devices and can pass investigative requirements, litigation, or regulator controls.

Image: flickr.com

Recommended Posts | Data Loss Prevention

Secure Your Linux System

5 Tips to Secure Your Linux System

In the age where hacking has become a common issue, naturally security becomes extremely important. This is one of the reasons why it is important to secure your Linux server. So in this article I am going to discuss some security tips that are related to Linux ...
Whatsapp Data Loss Restored

Whatsapp Data Loss Restored. How Do It?

We are living in an age of digital communication and recently, messenger apps such as WhatsApp have taken over the scene. With the app hitting 600 million active users as at August 2014, WhatsApp continues to grow in popularity with each passing day. The app gains an impressive 25 million new users ...
Top Data Blunders Every Startup is Making

5 Top Data Blunders Every Startup is Making

Large corporations and business organizations usually maintain an IT department that oversees the company's data management and IT related issues. Micro and small business owners usually cannot afford an IT department. Unfortunately they can not up-to-date on the fast changing business technology ...
Simple Tips To Protect Your Corporate Data

Simple Tips To Protect Your Corporate Data

Theft of corporate data is on the rise. Hacking techniques and sophisticated malware attacks are becoming commonplace, and even the most robust security seems to be at risk of exploitation. Here are four simple suggestions to help you keep the hackers out of your business systems ...