Security Spending Decisions Leave Sensitive Data Vulnerable
With ever-greater frequency, new security threats arise that either didn’t exist previously or are more sophisticated versions of older types of attacks and now have a better shot at getting past existing security measures. The results – Enterprise spending to protect data is up sharply, compliance requirements as well as data privacy and security regulations keep increasing, but the breaches still keep coming. Security controls need to prioritized with this new reality in mind, and changes made accordingly. Tools that can help to prevent access to sensitive data internally, identify unauthorized data access activities, and that keep it from being useful without once identified and exported should now have at least equivalent priority.
In this E-book Garrett Bekker, Principle Analyst for Information Security at 451 Research, reviews the detailed findings of the just released 2017 Thales Data Threat Report about data threats that enterprises are experiencing, what they are doing to secure their data today, and moves on to actionable recommendations that enterprises can use today to secure their sensitive data from internal and external threats.
The report, which is in its fifth year, polled 1,100 senior IT security executives at large enterprises around the world and indicates an ongoing disconnect between the security solutions organizations spend money on and the ability of those solutions to protect sensitive data. Also it draws an accurate representation of the 2017 Data Threat Landscape and about data threats that enterprises are experiencing, what they are doing to secure their data today, and moves on to actionable recommendations that enterprises can use today to secure their sensitive data from internal and external threats.
It is no wonder, then, that nearly one in three respondents feel their organizations are either ‘very vulnerable’ or ‘extremely vulnerable’ to threats to sensitive data.
Overall, the research suggests that the security industry looks increasingly like a dog chasing its own tail – despite more and more money spent on security each year, our collective problems continue to worsen.
About the Author:
Principal Analyst, Information Security Dept.,
Garrett Bekker is a Principal Analyst in the Information Security Practice at 451 Research. He brings a unique and diverse background, having viewed enterprise security from a variety of perspectives over the past 16 years.