SSI logo

Most IT Security Pros Don’t Know Where Their Sensitive Data Resides

Among key findings of a new study, while data security remains a continuing threat for organizations, it is not given the attention it merits.



By ·

TRAVERSE CITY, Mich. — The vast majority of IT security practitioners say they don’t know where their sensitive structured or unstructured data resides, according to a new study released by the Ponemon Institute.

Only 16% of respondents said they knew where their organization’s sensitive structured data resides, according to the State of Data Centric Security study, InformationWeek reports. Only 7% of respondents said they know the location of all sensitive unstructured data, including in E-mails and documents.

Not knowing where their organization’s sensitive or confidential data is located was the No. 1 worry of the IT security respondents, eclipsing both hacker attacks and insider threats, according to the study.

The study, which was sponsored by data integration software provider Informatica, is based on a survey of 1,587 IT security professionals whose jobs include helping protect sensitive or confidential structured and unstructured data.

The study’s purpose was to determine how organizations are responding to threats to the security of their structured and unstructured data. It revealed that they mainly rely on the classification of sensitive data to protect their data assets, InformationWeek reports.

When asked what technologies their organization uses to protect its structured data assets, 68% of respondents said sensitive data classification and 62% identified application-level access controls.

One of the key findings of the study was that while data security remains a continuing threat for organizations, it is not given the attention it merits.

“What this study shows is that data protection procedures at most organizations are woefully insufficient, as sensitive and confidential data continues to proliferate beyond traditional IT perimeters,” said Larry Ponemon, the institute’s chairman and founder.

Ponemon noted that while 79% of respondents agree that ignorance of sensitive data locations poses a serious security threat, only 51% believe that securing data is a high priority for their company.

The gap between the two suggests a lack of tools and resources, Ponemon said. “Clearly, the time is ripe for a wider adoption of automated solutions that make it easier and more economical to make data-centric security an enterprise priority,” he said.

The study found that a clear majority of respondents (60%) said that their organizations are not using automated technologies to discover where sensitive or confidential data is located.

Of the 40% whose organizations are using automated tools, 64% said those tools are used to discover sensitive or confidential data located in databases and enterprise applications, but only 22% said they are used to uncover sensitive data in individual files and emails.

The most popular data security tools and capabilities are automated user access history with real-time monitoring and policy workflow automation, according to the survey.

A large majority of respondents were not confident in their ability to detect data breaches of either structured or unstructured data, the study found.

Twenty-six percent of respondents said they are confident in their ability to always detect a data breach involving structured data, while only 12% are as confident if the breach involves unstructured data.

When asked how a data breach might have been avoided, 58% of respondents said having more effective data security technologies in place, 57% cited more skilled data security personnel, and 54% said more automated processes and controls.

The best approach for organizations that are determined to discover all locations of their organizations’ sensitive data is to procure a software tool that can automate the discovery, analytics, and visualization of sensitive data location and proliferation, according to the study.

“Automated sensitive data-discovery solutions are believed to reduce the risk to data and increase the security effectiveness,” the study said.


Article Topics
Business Management · Systems Integration · Other · General Industry · General Interest · Physical-IT Security Convergence · News · Cyber Security · All Topics


Latest Download
The industry-wide migration to IP video surveillance over the last few…
Trending


SPONSORED LINKS


Don't miss out! Subscribe to Security Sales & Integration magazine today. - Security Sales & Integration

EDITOR'S CHOICE