Skip to content

Discerning Data

  • About Us
  • Additional Resources
  • Contact Us

DISCERNING DATA

A Faegre Drinker Blog Covering the Latest in Privacy, Cybersecurity and Data Strategy

  • Privacy
  • Cybersecurity
  • Data Strategy
  • Disruptionware

Data Security Concerns Continue in 2018 – Survey Provides New Insight

Share

A vast majority of companies report feeling vulnerable to data breaches and security threats, according to a recent report published by a data security provider and information technology advisory company. It is predicted that companies are planning on spending more than ever before to protect themselves in 2018.

The report, published by Thales eSecurity and 451 Research, summarizes the surveyed responses of more than 1,200 senior security executives employed in the U.S., U.K., Germany, Japan, Sweden, the Netherlands, Korea, and India. Of these respondents, more than one-third had major influence on security-decision making, and nearly half had sole-decision making authority.

Data Breaches

The number of data breaches nearly doubled in 2017, with 46 percent of U.S. respondents reporting that they experienced a data breach in the past year, as compared to 24 percent in 2016.  More than one-third of the global respondents reported having experienced a data breach in 2017. Citing a fear of financial penalties, 78 percent reported plans to increase spending on data security and IT in 2018, including nearly 86 percent of U.S. respondents.

In light of the increasing amount of data breaches, it is perhaps not surprising that 91 percent of global respondents reported feeling vulnerable to security threats and attacks going forward. Companies most frequently cited “privileged user” (or those persons within a company who are given unfettered access to data and IT systems) attacks as being the top threat they are fearful of, with cybercriminals being the second most frequently cited threat.

Spending Paradox

The report notes that although securing data-at-rest—namely data that is archived and accessed infrequently—was perceived by most respondents as being the most effective method of data defense, most respondents planned on spending more money on defense aimed at protecting the network when accessed by devices remotely, otherwise known as endpoint security.

Notably, most respondents perceived endpoint security defense as being the least effective means of data defense. Thus, it appears that although companies are aware that unsecured data at rest exposes them to significant threat and liability, they are not devoting resources in a way that reflects this awareness. This may be in part due to the perceived complexity and effects of implementing such changes. The report notes that 43 percent of global respondents cite the complexity of data as being the main barrier to data security. Further, nearly 42 percent of global respondents cited concerns about performance and the impact of implementation on business process as being the largest barrier.

Compliance versus Security

The report states that nearly 64 percent of respondents reported feeling that compliance with relevant laws is an effective means of preventing security threats. Yet, the report notes, while compliance with existing laws may be helpful, compliance will not prevent data breaches because regulations are generally reactive. Conversely, data and security threats and vulnerabilities continue to change and evolve at a far more rapid pace. The increase in the number of breaches is likely demonstrative of this, as it appears that one-third of the respondents still experienced data breaches in 2017 (assuming those respondents were in compliance with the relevant regulations).

Respondents to the survey represented a number of industries, including automotive, energy, government, financial services, healthcare, IT, manufacturing, retail, and telecommunications. Of the respondents, more than one-third had major influence on security-decision making, and nearly half had sole-decision making authority.

The 2018 Thales Data Threat Report-Global Edition can be downloaded here.

Subscribe and Receive Alerts to New Articles

SUBSCRIBE
February 6, 2018
Written by: Daniel Walbright
Category: Cybersecurity
Tags: Data Security

Post navigation

Previous Previous post: Building the Blocks of Knowledge – NIST Releases Draft Blockchain Technology Overview
Next Next post: Strava’s Heatmap & IoT Devices

Search the Blog

Sign Up for Email Alerts

PODCASTS

Faegre Drinker on Law and Technology

©2022 Faegre Drinker Biddle & Reath LLP. All Rights Reserved. Lawyer Advertising.

  • About Us
  • Additional Resources
  • Contact Us
We use cookies to improve your experience with our website. By browsing our site, you are agreeing to the use of cookies. For more information about how we use cookies, please review our privacy policy and cookie policy. OK
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT