Kumari Palany & Co

No. of views : (1856)

IT employees not confident of internal data protection, says report

Posted on: 11/Jun/2016 9:53:07 AM
Digital security company Gemalto has recently released a report that has said that a majority of IT employees who work in organisations are not confident regarding internal data protection after incidents of repeated data breach. The Third Annual Data Security Confidence report was released on Wednesday. It is based on a world wide survey of IT decision makers who work in different organisations. 

According to the report, 61 percent of the respondents say that their perimeter security systems (firewall, IDPS, AV, content filtering, anomaly detection, etc.) were very effective at keeping unauthorised users out of their network. 69 percent say that they are not confident regarding their organisation’s perimeter security, which they feel can be easily compromised during the incident of a data breach. 

When asked to retrospect, around 66 percent of the respondents believed that security was not tight in 2015. In 2014, the number was at 59 percent. 66 percent believe unauthorised users can access their network and nearly two in five, that is 16 percent, said unauthorised users could access their entire network.

Speaking about this, a senior executive from Gemalto said, This research shows that there is indeed a big divide between perception and reality when it comes to the effectiveness of perimeter security. The days of breach prevention are over, yet many IT organisations continue to rely on perimeter security as the foundation of their security strategies. The new reality is that IT professionals need to shift their mind set from breach prevention to breach acceptance and focus more on securing the breach by protecting the data itself and the users accessing the data. 

While companies are confident in the amount of spending and where they are spending it, it`s clear the security protocols they are employing are not living up to expectations. There is a need for a layered approach to security. While protecting the perimeter is important, organisations need to come to the realisation that they need a layered approach to security in the event the perimeter is breached. By employing tools such as end-to-end encryption and two-factor authentication across the network and the cloud, they can protect the whole organisation and, most importantly, the data.

Post your requirement - We will connect with the right vendor or service provider