Information Security for the Modern Enterprise

Size: px
Start display at page:

Download "Information Security for the Modern Enterprise"

Transcription

1 AIIM White Paper Information Security for the Modern Enterprise How safe is too safe? - information lock-down vs sharing and collaboration Sponsored by

2 About the White Paper As the non-profit association dedicated to nurturing, growing and supporting the user and supplier communities of ECM (Enterprise Content Management) and Social Business Systems, AIIM is proud to provide this research at no charge. In this way the entire community can leverage the education, thought- leadership and direction provided by our work. Our objective is to present the wisdom of the crowds based on our 70,000-strong community. We are happy to extend free use of the materials in this report to end-user companies and to independent consultants, but not to suppliers of ECM systems, products and services, other than OpenText and its subsidiaries and partners. Any use of this material must carry the attribution AIIM / OpenText Rather than redistribute a copy of this report to your colleagues, we would prefer that you direct them to for a free download of their own. Our ability to deliver such high-quality research is made possible by the financial support of our underwriting sponsor, without whom we would have to return to a paid subscription model. For that, we hope you will join us in thanking our underwriter for this support: OpenText 275 Frank Tompa Drive Waterloo, Ontario Canada, N2L 0A1 Phone: Web: Process used and Survey Demographics While we appreciate the support of our sponsor, we also greatly value our objectivity and independence as a nonprofit industry association. The results of the survey and the market commentary made in this report are independent of any bias from the vendor community. The survey was taken using a web-based tool by 255 individual members of the AIIM community between October 26, and November 21, Invitations to take the survey were sent via to a selection of the 65,000 AIIM community members. Survey demographics can be found in Appendix A. Graphs throughout the report exclude responses from organizations with less than 10 employees taking the number of respondents to 223. About AIIM AIIM has been an advocate and supporter of information professionals for nearly 70 years. The association mission is to ensure that information professionals understand the current and future challenges of managing information assets in an era of social, mobile, cloud and big data. AIIM builds on a strong heritage of research and member service. Today, AIIM is a global, non-profit organization that provides independent research, education and certification programs to information professionals. AIIM represents the entire information management community: practitioners, technology suppliers, integrators and consultants. AIIM runs a series of training programs, including the Certified Information Professional (CIP) course. About the author David Jones is a Market Analyst with the AIIM Market Intelligence Division. He has over 15 years experience of working with users and vendors across a wide range of vertical markets. His experience has focused on taking complex technologies, such as business intelligence and document management, and developing them into commercial solutions largely in the retail, web and customer relationship management (CRM) areas. He has worked as a consultant providing document management, data mining and CRM strategy and implementation solutions to blue chip clients in the UK and Europe and produced a number of AIIM survey reports on issues and drivers for Capture Solutions, SharePoint, Cloud Computing and Social Business. David has a BSc in Computer Science, and is a qualified CIP, ECMP and SharePointP AIIM Europe AIIM AIIM Europe 1100 Wayne Avenue, Suite 1100 The IT Centre, Lowesmoor Wharf Silver Spring, MD Worcester, WR1 2RR, UK (0) Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration

3 Table of Contents About the White Paper: About the White Paper... 1 Process used... 1 About AIIM... 1 About the author... 1 Introduction: Introduction... 3 Information Assets... 3 Appendix 2: Open Questions Appendix 2: Open Questions Selected responses Underwritten in part by: OpenText AIIM Data Location: Data Location... 5 Security Risks: Security Risks... 8 Corporate Issues: Corporate Issues Conclusion and Recommendations: Conclusion and Recommendations Recommendations References Appendix 1: Survey Demographics Appendix 1: Survey Demographics Survey Background Organizational Size Geography Industry Sector Job Role Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration

4 Introduction Enterprise security is changing. The domain of the enterprise security professional is moving from that of internal access policies, VPN management and compliance techniques to a much wider context. Mobile, social and cloud technologies are extending the types and reach of the information that needs to be secured and managed. The dilemma that organizations face is that whilst they may wish to protect their information from all possible risks, that does not marry well to the diverse and interactive nature of today s business landscape. Information, much of which is now unstructured, is flowing in and out of organizations at an unprecedented rate and the challenge all organizations have is to balance the benefits of this information free-flow against the potential risks, and to deliver a security framework that maintains high levels of protection whilst not stifling business processes. Before an organization can make any decisions it needs to analyze and understand the types of information that need to be protected and maintained, the relative importance of the various information assets, the processes that information is part of, the potential damage to the organization should that information not be secure, and the solutions available in the marketplace. This paper will look at the various types of information that needs to be managed, how important this information is to organizations, the types of security being deployed and the potential risks should that security not be good enough. Finally the paper will provide a series of recommendations and steps towards securing these vital information assets. Information Assets Organizations store a multitude of information and content ranging from employees payroll details to product information and financial accounts. This information can be classified at various levels, according to widely accepted standards 1. The majority of our survey respondents (86%) store company confidential documents although it would be interesting to know what the remaining 14% do with their important information. Of interest are the surprisingly large number of organizations storing Secret (31%) and Top Secret (14%) information, especially in larger (>5000 employees) organizations where these rise to 40% and 17% respectively. Figure 1: Which of the following security-level documents is your organization storing? (select all that apply) (N=223) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Top Secret Secret Company Confiden al Department Confiden al Restricted Unclassified None of these 0% 5% 10% 15% 20% 25% 30% Customer informa on AIIM Intellectual property / OpenText Financial records 3Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration

5 As discussed above, organizations store a wide array of information types, each of which will have a varying level of importance to each specific organization. This importance is of course subjectively based on the view of the individual respondent, and could be influenced by the department they reside in or the industry they work in (for example a research scientist may feel that intellectual property (IP) is more important than financial records), but given the wide range of job roles and organizational types of our respondents, the figures shown below can be deemed to be generally representative. Understandably, customer information shows strongly with 27% indicating that this is their most important information asset. Without careful management of this information an organization would not be able to sell new products or services, invoice 0% those 10% customers 20% or 30% analyze 40% their 50% preferences 60% to 70% perform 80% future 90% marketing. 100% Traditional customer information would purely have been data such as contact details, purchase histories and perhaps some additional Top Secret lifestyle records but customer information can now include social media history, geo-location data, and internet history records. The majority of this information is unstructured and the integration and management Secret of this combination of structured and unstructured data is a key aspect to the success of any organization. Respondents Company also recognized Confiden al that other information types such as IP (20%), financial records (16%) and project documents (15%) hold significant value. Interestingly HR and employee information at 7% was not deemed Department as important Confiden al however, when it comes to securing information assets, this becomes one of the most important to manage. Restricted Another important aspect when viewing the importance of data is the consideration of business value versus regulatory value. Certain types of information, such as IP and project documents, are important from the Unclassified perspectives of running the organization. Other information types such as customer, staff and financial information hold business value but also have regulatory or data protection aspects - where rules and None of these regulations firmly govern the security requirements and management of the data. Figure 2: Which of the following would you say is your organization s most important information asset? (N=221) 0% 5% 10% 15% 20% 25% 30% Customer informa on Intellectual property Financial records Project documents HR/ Employee specific Product related informa on Investor related informa on Externally licensed data Other The relationship between information governance, compliance and IT is a complex balancing act and in order for an organization to successfully manage this balance a top-down approach is imperative. C-level executives need to appreciate the individual elements of this triumvirate in order to be able to determine which security controls are appropriate to manage their information, aligning these with the governance goals and compliance requirements of the organization to manage information risk as effectively as possible. To that end, it is reassuring to see that over half (58%) claim to fully appreciate the value of their information and support active Set steps culture to firmly secure as it, but it is of concern that this figure is not 100%. A further 20% are keen to remain compliant open but informa on have no specific requirements. This could suggest that their primary focus is on protecting their organization sharing and should anything go wrong but that they do not want to be specifically held exchange with less responsible for regulatory compliance. Alternatively it could also indicate that they simply have not recognized regard to risks, 3% the risk. A similar number (19%) has the same attitude; assuming that IT should deal with that sort of thing. Fully appreciate the value of info & Assume it is dealt support ac ve steps with by IT, & take to secure, 58% AIIM 2013 li le interest, 19% / OpenText Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration

6 HR/ Employee specific Product related informa on Investor related informa on A small Externally number of licensed organizations data have taken the very brave stance of embracing information sharing and exchange as a strategic decision. While this conceptually and philosophically may be the ultimate in liberating Other the workforce and freeing the organization s information, we do all live in the real world, and some types of information simply cannot be freely shared. For example, an organization needs to store employee bank details in order to be able to process payroll. Executives and employees alike would not be comfortable with this type of information being freely available to share throughout the organization. Figure 3: Which of the following best describes how senior management in your organization view information security?? (N=221) Set culture firmly as open informa on sharing and exchange with less regard to risks, 3% Assume it is dealt with by IT, & take li le interest, 19% Fully appreciate the value of info & support ac ve steps to secure, 58% Keen to be compliant wrt regula ons, but have no specific corporate requirements, 20% Data Location In this electronic, and increasingly cloud and mobile-based age it is interesting to see the amount of corporate information that is still held on paper: 14% across all information types and a massive 23% in HR. This highlights a leaning towards paper processes in HR 0% and also 20% raises the 40% question as 60% to whether 80% HR is seen as an important business asset by the board. More likely is the Contact/Client fact that, as alluded database to above, (CRM) the type of information stored by HR is of a more sensitive nature (bank information, addresses, salary details, etc.) and requires a higher level of security than other areas such as marketing or Intellectual product management. property This should not be seen as a valid reason to avoid moving to electronic storage; quite the opposite, it should be used a driver to improve overall, organization-wide security mechanisms to secure Financial this and records other types of information. Also of interest is the apparent reluctance of organizations to use the cloud as their primary information space with only 2% claiming Project they are documents using the public cloud as their primary space to store client (or CRM) information. With cloud-based services such as Salesforce.com claiming huge user numbers 2 this very low figure seems strange, however, HR/ Employee it may highlight specific a misunderstanding about how data on such SaaS (Softwareas-a-Service) applications is stored do users believe that their data is stored in a private cloud, not in a private instance on a very public cloud? Product related informa on Share-sensi ve informa on Externally licensed data On-paper On-premise Private cloud Public cloud 5Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration

7 Figure 4: Where does your organization primarily store the following information assets? (N=219) 0% 20% 40% 60% 80% Contact/Client database (CRM) Intellectual property Financial records Project documents HR/ Employee specific Product related informa on Share-sensi ve informa on Externally licensed data On-paper On-premise Private cloud Public cloud The potential misunderstanding of where data physically sits continues when looking at future storage options: only 10% claim they would consider storing CRM information in a public cloud. Project documents (14%) and product information (12%) are the information types with the highest potential public cloud storage levels but neither are particularly large, or reflect the adoption levels found in other AIIM research 3. It appears that the jury is still out regarding cloud in general, with private clouds being considered by around half (51%) but with the low positive responses for public clouds, a similar number do not expect to store information in any cloud offering indeed 53% would not consider storing any of their IP in a cloud service. Figure 5: Would your organization consider storing the following information assets in the cloud? (N=217) Contact/Client database (CRM) Intellectual property Financial records Project documents HR/ Employee specific Product related informa on Share-sensi ve informa on Externally licensed data 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Private cloud Public cloud Neither 6Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration

8 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Project documents Contact/Client database (CRM) HR/ Employee specific Intellectual property Product related informa on Data sovereignty is defined as the consideration of laws and regulations that come into play when data that is Financial records generated in one country is then stored in a different country. For example, if content is created in the UK and stored on a cloud Share-sensi ve server in the informa on US, whose laws govern that data? Project documents This concept is not Externally always understood licensed data with 24% not aware of any regulations applying to them, and even where it is understood HR/ Employee steps are not specific always taken to manage it -10% are aware of regulations but are not managing them. Over a third Product are aware related of these informa on issues, however, Private cloud and are managing Public cloud them accordingly. Neither This number may also have influenced the adoption of the cloud in this area 4, given that a number of cloud services do not publicise or indeed guarantee Share-sensi ve the physical informa on locality of data stored on their servers. Figure 6: Is any of your data subject to any particular data sovereignty regulations (i.e. data has Externally to remain licensed within dataparticular geographical regions)? (N=212) Private 0% cloud5% Public 10% cloud 15% 20% Neither 25% 30% 35% 40% 45% Yes aware and managing Yes aware but not managing No0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Yes aware and managing Not aware of such regula ons Yes aware but not managing The issue of data sovereignty becomes relevant when you consider that a combined 48% store content in a country other than where it was created, either in public cloud, private cloud or on-premise No No problems exist if these organizations are fully aware of any data sovereignty issues and are managing them but for those that either aren t dealing with these issues or are not aware of them, serious challenges may be encountered Not aware in of the such future. regula ons This becomes particularly prevalent in regard to localized legislation, such as the US Patriot Act or UK Data Protection Act, which give investigatory powers to authorities in the relevant 0% 5% 10% 15% 20% 25% 30% 35% 40% geographies that may not be expected, or indeed welcome. For example, a European organization storing customer data on a US-based server may not be aware that the US Government, as part of its anti-terrorism initiatives, Public cloud can delve unknown into that data data center and loca on perform extensive analysis on, potentially in contradiction to the laws and regulations in the country from where the data originates. Public cloud in country of origina on Figure 7: Do you store data in any of the following? (Select all that apply) (N=208) Public cloud in non-origina ng country 0% 5% 10% 15% 20% 25% 30% 35% 40% Private cloud in country of origina on Public cloud unknown data center loca on Private cloud in non-origina ng country Public cloud in country of origina on On-premise in non-origina ng country Public cloud in non-origina ng country Private cloud in country of origina on Private cloud in non-origina ng country On-premise in non-origina ng country 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%100% External hacking Malware/ viruses Unauthorized access by staff 7Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration

9 Not aware of such regula ons Security Risks Having assessed the information assets within organizations, their relative importance and where they are stored, it is time to dive deeper into how these assets are secured. It would appear that the so-called traditional 0% 5% security 10% risks 15% of external 20% hacking 25% and 30% malware/viruses 35% 40% have been secured, at least to the satisfaction of most respondents. Unauthorized access to content from Public staff cloud is also unknown well secured data center in the loca on eyes of the majority. However, how well founded is this confidence is an organization fully secured because a firewall or antivirus system has been installed? We explore this further in the next section. Public cloud in country of origina on Data leakage via social media has a fairly even split between those who feel fully secured and those who have Public some cloud security in non-origina ng but not enough country this raises the interesting question of what is fully secured in relation to social media? Is it that all posts need to be approved, that automated tools constantly search for references to posts relating to the organization, simply that the organization has a social media acceptable use policy or Private that social cloud media in country usage of is origina on banned in the organization? None of these in singularity will fully protect against data leakage in this manner and a software and staffing combination of all of them is required to carefully Private manage cloud social in media non-origina ng content in country general. An interesting result relates to unauthorized access by ex-staff where many (71%) believe that they are not sufficiently On-premise covered. in non-origina ng Why do they country think that ex-staff have more potential access to information than current ones? What happens differently when they leave the organization? Perhaps the concern is more of a perceived issue than a real one, driven largely by the fact that the organization is no longer in control of that person s primary point of information access, i.e. their desktop. Figure 8: What level of security does your organization have in place to protect from the following risks? (N=219) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%100% External hacking Malware/ viruses Unauthorized access by staff Data leakage via social media Unauthorized access by contractors Accidental loss/breach by staff Unauthorized access by ex-staff Fully secured Some security but not enough No Security The confidence in managing external security risks shown above follows through to where respondents see the most likely security breaches coming from a relatively low number see external hacking (20%) and malware/viruses (14%) as the most likely source of a security breach. Despite feeling that they have protection in place against it, almost half (49%) believe that unauthorized access by staff is the area of largest concern. This is significant as it shows that the internal risk is perceived to be much greater than the external risk, and also potentially highlights that this sort of threat is not so straightforward to protect against. Perimeter security such as firewalls and the like do not provide any protection against an in-house threat. An interesting distinction is also made by respondents accidental or inadvertent breach by staff was only selected by 5%, indicating that the internal risk from staff is not likely to be accidental but quite deliberate, although there will no doubt still be occasional instances of laptops being lost, and the data on them therefore exposed to risk. 8Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration

10 Figure 9: What do you feel the most likely source of a security breach is? (N=218) 0% 10% 20% 30% 40% 50% 60% External hacking Malware/ viruses Unauthorized access by staff Unauthorized access by ex-staff Unauthorized access by contractors Accidental/ inadvertent by staff Other In an attempt to secure their internal data, organizations are deploying a multitude of techniques, the most prevalent of which are permissions and access control (94%), anti-virus/malware tools (91%), strong passwords (84%) and perimeter security (76%). Again the majority of these are focused on protecting from external threats, with only permissions and access 0% control 10% only partially 20% addressing 30% the 40% internal 50% threat from 60% abuse by staff. While it could be argued that abuse by staff cannot be addressed by the toolset listed, rights management solutions do exist External they simply hacking 0% are not 20% being used 40% by many 60% (15%). This 80% could 100% be for any number of reasons complexity, lack of understanding, or prohibitive cost are possibilities possibly leaving an opportunity Use of permissions for a new breed and access of Malware/ intelligent, control viruses automated exception detection and tracking tools. Given the complexity An -virus/an -malware and cost of such a new breed of tools it is unlikely that organizations will be able to Unauthorized access by staff deploy these short-term, so it is important that organizations do as much as they possibly can to minimize the Strong passwords and/or password expira on internal threat with Unauthorized the tools they access already by ex-staff have. Ensuring the correct allocation, and de-allocation, of access rights to content Perimeter and security information (VPNs, is SSL, an excellent etc) place to start, ideally by means of a role-based authentication and permission Unauthorized Encrypted system. Logging file access store/database of by content contractors interactions is also a pre-requisite, as is the analysis of such logs for exceptions and misuse. Accidental/ Password protected inadvertent files by staff An alternative, but even simpler approach, is the password protection of individual files which is performed Mandatory by 46% access of respondent control, security organizations. classifica ons This approach Other maintains high levels of protection but is prone to error. Strong Apparently authen ca on it is (mul -factor, not uncommon biometrics, to find an etc) unprotected version of a password-protected file. An automated agent that trawls the corporate network identifying such files, or even finding unprotected files that contain Rights management solu on (DRM) keywords such as salary, medical conditions, personal, etc. would be a simple but effective first line tool for organizations. We don t Figure 10: How do you secure your internal information assets? (Select all that apply) (N=211) 0% 20% 40% 60% 80% 100% Use of permissions and access control An -virus/an -malware Staff are not allowed Strong passwords to informa on and/or password expira on beyond Perimeter the firewall, security (VPNs, SSL, etc) 18% Encrypted file store/database Password protected files Mandatory access control, security classifica ons Strong authen ca on (mul -factor, biometrics, etc) Rights management solu on (DRM) We encrypt/protect all files that pass beyond the firewall, 25% We don t We tend to share informa on in a rela vely free manner, 40% We track content that moves beyond the firewall, 18% 9Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration

11 Accidental/ inadvertent by staff Other Despite the fact that the majority of information that needs to be secured is inside the firewall, no organization is completely insular, and at some stage will see its information go beyond the firewall, or move from information at rest to information in motion. This information in motion is not confined to purely sending documents to external contacts but can include access on tablets, information saved on USB memory sticks, documents saved to cloud-based file-share 0% services 20% and more. 40% As a 60% result securing 80% this 100% type of information requires a different mindset and approach new security models where security stays with the data, as opposed Use of permissions to housed and in the access applications, control are being deployed, particularly to combat mobile device security issues. An -virus/an -malware Despite Strong the passwords availability and/or of tools password and expira on techniques to secure information in motion, small and medium organizations (<5000 employees) tend to share their information in a relatively free manner (43%), probably Perimeter security (VPNs, SSL, etc) due to a number of reasons, such as the need to be responsive and respond quickly to competitive threats, but also in reality Encrypted because they file store/database don t have the ability to stop, or the means to police staff passing information beyond the firewall. Password protected files Mandatory An argument access could control, be made security that classifica ons smaller organizations do not have the IT budget to deploy techniques such as encryption to manage this data, however, the opposite is true with 27% of small organizations Strong (<500 authen ca on employees) (mul -factor, making use biometrics, of encryption etc) versus 29% of large organizations (5000+) and 21% of medium organizations Rights ( ). management solu on (DRM) Around 18% of organizations do not We allow don t staff to pass information beyond the firewall. How well this is regulated and whether it actually happens may well be a different matter. On the flip side, this means that 82% are conscious of the fact that they have data outside of their immediate control and are at least taking some measures to manage it. Figure 11: Which of the following best describes your approach to managing internal data that has passed beyond the firewall? (N=205) Staff are not allowed to pass informa on beyond the firewall, 18% We encrypt/protect all files that pass beyond the firewall, 25% Just because an organization has an approach to managing information beyond the firewall, does not necessarily mean that approach is working. As if to reinforce that concept, 28% of respondents claim that they have no way to tell if their approach is working or not, with a further 5% claiming that their organization is not managing their external information at all. On initial inspection the 45% who claim not to have had any problems delivering their strategy would appear positive. However, a word of caution if those 0% organizations 5% 10%15% do not 20%25% have the 30%35% right tools 40%45% in place 50% they may be looking purely at the tip of the iceberg and not aware of the numerous issues that might be occurring under the waterline. Not managing it at all Of further concern are the 17% who see staff bypassing the security restrictions placed on them, presumably a number of whom are No sharing way to tell information via cloud-based file-sharing tools, such as Skydrive or GoogleDocs. Surely a better approach for organizations in this situation would be to provide this type of sharing facility and create corporate, enterprise-grade accounts with security-oriented cloud file-share vendors Staff and are able ensure to bypass that relevant security levels restric ons of security are used which normally are non-existent on freemium versions of the tools. Not had any problems Cannot effec vely work due to restric ons We tend to share informa on in a rela vely free manner, 40% We track content that moves beyond the firewall, 18% Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration 10

12 25% We track content that moves beyond the firewall, 18% Figure 12: How well do you think you are achieving [your management of internal data that has passed beyond the firewall?] (N=202) Not managing it at all No way to tell Staff are able to bypass security restric ons Not had any problems Cannot effec vely work due to restric ons in place 0% 5% 10%15% 20%25% 30%35% 40%45% 50% Corporate Issues It is always important to look at the attitudes and culture of organizations in addition to the purely technical aspects of security. From our respondents it is clear that the majority see adherence to compliance regulations (65%) and ensuring the privacy of their customer data (67%) are absolutely essential. These far outweigh the need to be able to collaborate, either internally or externally, which are deemed important but by no means essential. This highlights the conflict that exists in organizations worldwide: the constant need to balance the creativity and productivity that collaboration can deliver with the overriding need to ensure that the organization remains compliant with required industry or geographical regulations. Obviously the need to remain compliant trumps anything else; an organization that is closed down due to non-compliance is useless. Therefore, the key aspect of deploying any security strategy within an organization is to find the best balance between remaining compliant and encouraging innovation, collaboration and creativity. No longer can content and information be locked away for safekeeping. Business recognizes the benefits and productivity gains to be gained from effective collaboration, uninhibited content creation and mobile access. Organizations now need to utilize their investment in information infrastructure and selectively expose and mobilize the content that matters: set your data free but put a GPS tag on it for good measure. Figure 13: Rate the following in terms of their importance to your organization (N=211) Adherence to compliance/governance regula ons Ensuring privacy/security of customer data Ability to collaborate internally effec vely Ability to collaborate externally effec vely Ability to quickly create new content Allowing mobile access to informa on 0% 10% 20% 30% 40% 50% 60% 70% 80% Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration Not Important Important Essen al 11

13 Ensuring privacy/security of customer data Ability to collaborate internally effec vely As a final Ability salutary to collaborate note we take externally a closer effec vely look at some of the ramifications of getting information security management wrong. The results are quite sobering as almost half of respondents (46%) have seen some form of staff disciplinary Ability to quickly action create within new their content organization in relation to information security and over a third (34%) have seen job losses as a result. To further highlight Allowing the mobile importance access to of informa on getting information security right, 1% of respondents have seen a jail term as a result of a security breach or misdemeanor. Company punishments have also been seen but in lesser numbers than punishments to employees a word Not Important Important Essen al of caution indeed to all working with information. Figure 14: Has your organization ever been involved in any of the following regarding information security? (Select all that apply) (N=199) Staff disciplinary ac on Job loss Company disciplinary ac on Company financial penalty Loss of license Court case Jail term None of these 0% 10% 20% 30% 40% 50% Conclusions Enterprise information security is more than just protecting against viruses and hacker attacks. The diverse and collaborative nature of modern business means that information is being created, accessed and shared both internally and externally at a faster rate than ever before and the consequences of this information falling into the wrong hands have never been higher, or more visible to the world. A batten down the hatches approach is also being taken with regards to the management of external threats, with perimeter security such as firewalls, VPNs and SSL being regularly deployed and the concept that cloud storage of information should be limited to private clouds. Organizations think that they are secured against the well known threats of viruses, malware and external attacks, often simply because they have deployed perimeter security and internal antivirus software to manage these risks. Where they are less confident is with respect to unauthorized access by staff, suggesting that this internal threat is both harder to identify and to manage. We have seen that organizations are highly conscious of the need to maintain compliance and ensure the privacy aspects of sensitive data, but in complete contradiction some operate on an information free-sharing basis. The need to collaborate effectively is being actioned on a day-to-day basis despite the knowledge that regulations needs to be adhered to. Something has to give and this can be seen by the large number of disciplinary hearings and job losses as a result of information security mishaps. However, the frightening knowledge exposed here is that it is not the organization that would typically face the consequences for these mishaps it is the employee. Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration 12

14 The modern enterprise has to adapt. It is no longer a valid strategy to keep important information locked behind closed doors. Information is in motion, internally, externally, on mobile devices, in the cloud constantly. Understanding this is the first step in being able to develop a security strategy that protects key information in new and innovative ways, enabling the corporation to collaborate, be creative and evolve, while still firmly remaining secure and compliant. Recommendations 1. Identify a Security Champion at as high a corporate level as possible. This champion can be used to create the top-down awareness that is required for information security to be treated properly throughout any organization. 2. Perform an audit of the information assets that your organization uses or has access to. a. Detail these from the perspective of where they live, who uses them, what value they have to the organization and what the consequences of misuse are 3. Be aware how beyond-the-firewall information sharing can benefit your organization and include this in your information security strategy. 4. Identify the 3 rd party services that employees are using to bypass in-house restrictions evaluate the benefit in purchasing enterprise licences for these types of tools. 5. Deploy a roles- or group-based permission system for employees and ensure that roles are kept up-todate, especially when staff leave the organization. 6. Understand that protecting information both inside and outside the firewall requires a rethink in terms of linking information governance and compliance requirements with the information security controls that address information protection. Identify vendors and solutions that can work with you to both develop your information security strategy and then deploy it. 7. Use external consultants to test your security mechanisms 8. Develop acceptable use policies that detail how information can and should be shared. Communicate these with staff and explain the penalties for non-conformance 9. Continually review the all aspects of enterprise security to ensure their continued effectiveness. References 1. Classification Levels Wikipedia 2. Saleforce.com Wikipedia 3. Content in the Cloud - AIIM Industry Watch 4. Data sovereignty vs Cloud adoption Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration 13

15 Appendix 1: Survey Demographics Survey Background 255 individual members of the AIIM community took the survey between October 26, and November 21, 2012, using a Web-based tool. Invitations to take the survey were sent via to a selection of the 65,000 AIIM community members. Organizational Size Survey respondents represent organizations of all sizes. Larger organizations over 5,000 employees represent 28%, with mid-sized organizations of 500 to 5,000 employees at 33%. Small-to-mid sized organizations with 10 to 500 employees constitute 40%. Respondents (32) from organizations with less than 10 employees have been eliminated from the results. Geography 69% of the participants Middle East, are Africa, based in North America, with most of the remainder (20%) from Europe. South Africa, 2% Asia, Far East, Russia, Middle East, Africa, 2% South Africa, 2% Asia, Far East, Russia, Mexico, Central, 2% S.America, Caribbean, Mexico, Central, 3% S.America, Caribbean, 3% Australasia, 3% Australasia, Central 3% & Eastern Europe, 5% Central & Eastern Europe, 5% Western Europe, 7% 5,001-10,000 emps, 8% 5,001-10,000 emps, 8% Western Europe, UK & 7% Ireland, 9% UK & Ireland, 9% over 10,000 emps, 20% over 10,000 emps, 20% 1,001-5,000 emps, 21% 1,001-5,000 emps, 21% Canada, 16% Canada, 16% emps, 17% emps, 17% 501-1,000 emps, 11% 501-1,000 emps, 11% emps, 23% emps, 23% US, 53% US, 53% Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration AIIM / OpenText Media, 2013 Publishing, 6% Engineering & Web, 1% Construc on, 2% Media, Publishing, Other, 6% Government & Public Services - Local/State, 14

16 Western Europe, 7% Western UK Europe, & Ireland, 7% 9% UK & Ireland, 9% US, 53% US, 53% Industry Sector Canada, 16% Local and National Government together make up 23%. Finance, Banking and Insurance represent 14%. IT accounts 15%. Education shows Canada, at 16% 5%, with Utilities also at a lower than normal 5%. The remaining sectors are fairly evenly split. Normally, to avoid bias, suppliers of ECM products and services are eliminated from the results, however, given that this report is focused on general information and its security, the views of IT companies are equally relevant and therefore included. Bureau, Healthcare, Outsource, 2% 2% Bureau, Mining, Outsource, Oil & Gas, 3% 2% Consultants, Mining, Oil 3% & Gas, 3% Manufacturing, Consultants, 3% Aerospace, 3% Manufacturing, Professional Aerospace, Services 3% and Legal, 4% Professional Services Retail, and Transport, Legal, 4% Real Estate, 4% Retail, Transport, Real Charity, Estate, Not-for-Profit, 4% 4% Charity, Educa on, Not-for-Profit, 5% 4% Job Role Engineering & Construc on, 2% Engineering & Regulator, Construc on, Research, 2% Independent body, 2% Regulator, Research, Pharmaceu cal Independent and body, 2% Chemicals, 2% Healthcare, Pharmaceu cal 2% and Chemicals, 2% Educa on, 5% Media, Publishing, Web, 1% Media, Publishing, Web, 1% Other, 6% Government & Public Services -Local/State, Government 17% & Public Services -Local/State, 17% Government & Public Services -Na onal, 6% Government & Public Services -Na onal, 6% Finance, Banking, 10% Insurance, 4% IT & High Tech supplier of ECM products IT & High or services, Tech supplier 9% of ECM products or services, 9% The two main groups of respondents for this survey come from the records/document management or compliance/info management fields (39%) and from IT (40%). President, CEO, Other, 5% Managing Director, Records or document President, 2% CEO, Other, 5% management staff, Managing Director, Records 22% or document 2% LOB execu ve, depart head or management staff, process owner, 6% 22% LOB execu ve, depart head or process owner, 6% Business Consultant, 7% Business Consultant, Head 7% of IT, 5% Head of IT, 5% IT staff, 17% IT staff, 17% Other, 6% U li es, Power, Water, IT & High Tech not Telecoms, 6% ECM, 6% U li es, Power, Water, IT & High Tech not Telecoms, 6% ECM, 6% IT Consultant or Project Manager, IT Consultant 19% or Project Manager, 19% Head of records/ compliance/ Head informa on of records/ management, compliance/ 17% informa on management, 17% Finance, Banking, 10% Insurance, 4% Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration 15

17 Appendix 2: Open Questions What is your biggest concern regarding information security in your organization? Selected responses A lot of companies still bury their heads in the sand, unless something happens, at which time it s too late. Extremely difficult topic...everyone understands the importance of it, but not always considered a top priority until a problem occurs. I think IT organizations are cavalier about data security because they have false sense of control and because their business-critical data is often not personal sensitive data. IT folks need to ensure that Records and Information requirements are met -- duration of E-records requires longer retention criteria -- Migration cost is expensive Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration 16

18 Underwritten in part by About OpenText OpenText provides Enterprise Information Management software that enables companies of all sizes and industries to manage, secure and leverage their unstructured business information, either in their data center or in the cloud. Over 50,000 companies already use OpenText solutions to unleash the power of their information. To learn more about OpenText (NASDAQ: OTEX; TSX: OTC), please visit: Organizations are embracing EIM to tap the potential of information to uncover new opportunities, reduce and control costs, gain insight into operations, and impact the top and bottom line. At the heart of EIM, though, is an uncompromising principal that security is critical. Trust OpenText and EIM to help strike the balance for your organization fast, easy, and flexible use of information assets and the peace of mind of impermeable information security policies. On-premise or in the cloud, EIM protects vital information assets from unauthorized access and distribution. Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration 17

19 AIIM ( is the global community of information professionals. We provide the education, research and certification that information professionals need to manage and share information assets in an era of mobile, social, cloud and big data Founded in 1943, AIIM builds on a strong heritage of research and member service. Today, AIIM is a global, non-profit organization that provides independent research, education and certification programs to information professionals. AIIM represents the entire information management community, with programs and content for practitioners, technology suppliers, integrators and consultants AIIM AIIM Europe 1100 Wayne Avenue, Suite 1100 The IT Centre, Lowesmoor Wharf Silver Spring, MD Worcester, WR1 2RR, UK (0) Information Security for the Modern Enterprise: How safe is too safe? - information lock-down vs sharing and collaboration 18

AIIM White Paper. Survey Report: Mobile Content Security and Productivity. Sponsored by

AIIM White Paper. Survey Report: Mobile Content Security and Productivity. Sponsored by AIIM White Paper Survey Report: Mobile Content Security and Productivity Sponsored by About the White Paper As the non-profit association dedicated to nurturing, growing and supporting the user and supplier

More information

AIIM White Paper. ECM at the Crossroads - banks need to unite their numerous content repositories. Sponsored by

AIIM White Paper. ECM at the Crossroads - banks need to unite their numerous content repositories. Sponsored by AIIM White Paper ECM at the Crossroads - banks need to unite their numerous content repositories Sponsored by Introduction Financial institutions create vast amounts of information and records during their

More information

Document Approvals Management for SharePoint

Document Approvals Management for SharePoint White Paper Document Approvals Management for SharePoint Sponsored by: Introduction Mention document management to anyone involved in engineering, construction or the process plant industry and they will

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

AIIM White Paper. Managing Governance, Risk and Compliance with ECM and BPM. Sponsored by

AIIM White Paper. Managing Governance, Risk and Compliance with ECM and BPM. Sponsored by AIIM White Paper Managing Governance, Risk and Compliance with ECM and BPM Sponsored by About the White Paper As the non-profit association dedicated to nurturing, growing and supporting the user and supplier

More information

Extending Capture Capabilities Measuring the ROI

Extending Capture Capabilities Measuring the ROI Measuring the ROI Sponsored by: About the Research As the non-profit association dedicated to nurturing, growing and supporting the ECM (Enterprise Content Management) community, AIIM is proud to provide

More information

Information Rights Management for Banking Seclore FileSecure Provides Intelligent Document & Data Protection that Extends Beyond Enterprise Borders

Information Rights Management for Banking Seclore FileSecure Provides Intelligent Document & Data Protection that Extends Beyond Enterprise Borders Information Rights Management for Banking Seclore FileSecure Provides Intelligent Document & Data Protection that Extends Beyond Enterprise Borders A Seclore White Paper In an era where outsourcing, cloud

More information

Compliance in the Corporate World

Compliance in the Corporate World Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks Fax and Document Distribution Group November 2009 Abstract Maintaining regulatory compliance is a major business issue

More information

Security in Fax: Minimizing Breaches and Compliance Risks

Security in Fax: Minimizing Breaches and Compliance Risks Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information

More information

AIIM White Paper. Managing Governance, Risk and Compliance with ECM and BPM. Sponsored by

AIIM White Paper. Managing Governance, Risk and Compliance with ECM and BPM. Sponsored by AIIM White Paper Managing Governance, Risk and Compliance with ECM and BPM Sponsored by About the White Paper As the non-profit association dedicated to nurturing, growing and supporting the user and supplier

More information

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs.

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs. CIBECS / IDG Connect 2014 DATA LOSS SURVEY The latest statistics and trends around user data protection for business. REPORT www.cibecs.com 2 Table of ontents EXECUTIVE 01 02 03 04 05 06 SUMMARY WHO PARTICIPATED

More information

Cloud Security: Getting It Right

Cloud Security: Getting It Right Cloud Security: Getting It Right Sponsored by Armor Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute Research Report Cloud Security: Getting It Right Ponemon

More information

How To Protect Your Data From Theft

How To Protect Your Data From Theft Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness

More information

AB 1149 Compliance: Data Security Best Practices

AB 1149 Compliance: Data Security Best Practices AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California

More information

ITAR Compliance Best Practices Guide

ITAR Compliance Best Practices Guide ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations

More information

THE BENEFITS AND RISKS OF CLOUD PLATFORMS

THE BENEFITS AND RISKS OF CLOUD PLATFORMS THE BENEFITS AND RISKS OF CLOUD PLATFORMS A GUIDE FOR BUSINESS LEADERS DAVID CHAPPELL JANUARY 2011 SPONSORED BY MICROSOFT CORPORATION Cloud platforms are a fundamental part of the move to cloud computing.

More information

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Mobilize SharePoint Securely: Top 5 Enterprise Requirements

Mobilize SharePoint Securely: Top 5 Enterprise Requirements AN ACCELLION WHITE PAPER Mobilize SharePoint Securely: Top 5 Enterprise Requirements Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto,

More information

Risk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin

Risk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin Risk & Innovation in Cybersecurity Investments Sponsored by Lockheed Martin Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report Part 1. Introduction

More information

Digital Signatures for Document Workflow and SharePoint

Digital Signatures for Document Workflow and SharePoint Digital Signatures for Document Workflow Sponsored by: About the As the non-profit association dedicated to nurturing, growing and supporting the ECM (Enterprise Content Management) community, AIIM is

More information

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security Threat Risk Assessment: the final key piece of the PIA puzzle Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value

More information

The Advantages of Security as a Service versus On-Premise Security

The Advantages of Security as a Service versus On-Premise Security The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred

More information

Enterprise Content Management: Impact on Collaboration and Social Business

Enterprise Content Management: Impact on Collaboration and Social Business An AIIM Briefing Helping you manage and use information assets. Enterprise Content Management: Impact on Collaboration and Social Business Produced by AIIM Training By Bob Larrivee, Director/Industry Advisor

More information

2015 Cloud Security Survey. Security and privacy of sensitive data remains the most disturbing concern for 63% of organizations

2015 Cloud Security Survey. Security and privacy of sensitive data remains the most disturbing concern for 63% of organizations 2015 Cloud Security Survey Security and privacy of sensitive data remains the most disturbing concern for 63% of organizations Introduction Cloud technology is gaining increasing attention from businesses

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.

More information

The Journey to the Cloud for Life Sciences Content Management

The Journey to the Cloud for Life Sciences Content Management The Journey to the Cloud for Life Sciences Content Management Part 1: Industry Forces and Cloud Adoption complies with ISO 20252 Page Table of Contents Executive Summary 2 Industry Forces in Conflict 3

More information

trends and audit considerations

trends and audit considerations Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,

More information

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks BYOD File Sharing - Go Private Cloud to Mitigate Data Risks An Accellion Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks Executive Summary The consumerization of IT and the popularity

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Cloud Change Agents Drive Business Transformation

Cloud Change Agents Drive Business Transformation A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft The Status Of Cloud Computing As A Business Transformation Tool In The UK December 2012 Table Of Contents Executive Summary...

More information

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101 Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro

More information

Ensuring security the last barrier to Cloud adoption

Ensuring security the last barrier to Cloud adoption Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It

More information

10 Steps to a Successful Digital Asset Management Implementation by SrIkAnth raghavan, DIrector, ProDuct MAnAgeMent

10 Steps to a Successful Digital Asset Management Implementation by SrIkAnth raghavan, DIrector, ProDuct MAnAgeMent m a y 2 0 1 2 10 Steps to a Successful Digital Asset Management Implementation Strategies and Best Practices Implementing and deploying enterprise solutions across the organization can be complex, involving

More information

10 best practice suggestions for common smartphone threats

10 best practice suggestions for common smartphone threats 10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth

More information

The Cloud Balancing Act for IT: Between Promise and Peril

The Cloud Balancing Act for IT: Between Promise and Peril The Cloud Balancing Act for IT: Between Promise and Peril Table of Contents EXECUTIVE SUMMARY...2 ONBOARDING CLOUD SERVICES...3 SYSTEMS OF RECORD: THE NEXT WAVE OF CLOUD ADOPTION...6 A CULTURE OF COMPLIANCE

More information

Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Information Governance in Dental Practices. Summary of findings from ICO reviews. September 2015

Information Governance in Dental Practices. Summary of findings from ICO reviews. September 2015 Information Governance in Dental Practices Summary of findings from ICO reviews September 2015 Executive summary The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that

More information

CyberEdge Insurance Proposal Form

CyberEdge Insurance Proposal Form Note to the Proposer Signing or completing this proposal does not bind the Proposer, or any individual or entity he or she is representing to complete this insurance. Please provide by addendum any supplementary

More information

How to Deploy the Survey Below are some ideas and elements to consider when deploying this survey.

How to Deploy the Survey Below are some ideas and elements to consider when deploying this survey. SECURITY AWARENESS SURVEY Is a survey necessary A survey will give you insight into information security awareness within your company. The industry has increasingly realized that people are at least as

More information

10 Smart Ideas for. Keeping Data Safe. From Hackers

10 Smart Ideas for. Keeping Data Safe. From Hackers 0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000

More information

Business Case. for an. Information Security Awareness Program

Business Case. for an. Information Security Awareness Program Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security

More information

File Sync And Share And The Future Of Work

File Sync And Share And The Future Of Work A Forrester Consulting Thought Leadership Paper Commissioned By Dropbox March 2014 File Sync And Share And The Future Of Work Table Of Contents Executive Summary...1 Workers Are Embracing Sync And Share

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

BYOD File Sharing Go Private Cloud to Mitigate Data Risks AN ACCELLION WHITE PAPER BYOD File Sharing Go Private Cloud to Mitigate Data Risks Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA

More information

The Security Impact of Mobile Device Use by Employees

The Security Impact of Mobile Device Use by Employees The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security

More information

10 steps to the Cloud for SMBs Introduction to Cloud computing. www.fasthosts.co.uk. Ask the Experts. Making Business Work Better Online

10 steps to the Cloud for SMBs Introduction to Cloud computing. www.fasthosts.co.uk. Ask the Experts. Making Business Work Better Online 10 steps to the Cloud for SMBs Introduction to Cloud computing This paper is designed to explain, in plain English, the real reasons behind how your business can benefit from Cloud computing, and help

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Top five strategies for combating modern threats Is anti-virus dead?

Top five strategies for combating modern threats Is anti-virus dead? Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.

More information

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace Everything You Need to Know About Effective Mobile Device Management mastering the mobile workplace Table of Contents Introduction... 3 1. What exactly is Mobility Management Anyway?... 4 Impenetrable

More information

White Paper: Cloud Security. Cloud Security

White Paper: Cloud Security. Cloud Security White Paper: Cloud Security Cloud Security Introduction Due to the increase in available bandwidth and technological advances in the area of virtualisation, and the desire of IT managers to provide dynamically

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

NAREIM Session: Dangers and challenges of The Cloud. President, NiceNets Consulting, LLC

NAREIM Session: Dangers and challenges of The Cloud. President, NiceNets Consulting, LLC Main Types of Cloud Environments: - Public Cloud: A service built on an external platform run by a cloud service provider such as IBM, Amazon Web Services or Microsoft Azure. Subscribers can get access

More information

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Contact Center Security: Moving to the Cloud

Contact Center Security: Moving to the Cloud white paper Contact Center Security: Moving to the Cloud Table of Contents Executive Overview 2 A Critical Attribute of a Cloud Provider: Proven Security 2 How Do Well-established Companies Chose a Cloud

More information

The Challenge of Securing and Managing Data While Meeting Compliance

The Challenge of Securing and Managing Data While Meeting Compliance ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst

More information

Buyers Guide to ERP Business Management Software

Buyers Guide to ERP Business Management Software Buyers Guide to ERP Business Management Software one 1. Introduction When you search for ERP or Enterprise Resource Planning on the web, the sheer amount of information that appears can be overwhelming

More information

VARONIS WHITEPAPER Next Generation Enterprise Search

VARONIS WHITEPAPER Next Generation Enterprise Search VARONIS WHITEPAPER Next Generation Enterprise Search CONTENTS OVERVIEW 3 SEARCHING FOR SEARCH 4 A NEW APPROACH 5 Better results 5 Faster Results 5 Secure Results 5 Convenient Results 5 2 NEXT GENERATION

More information

SMALL BUSINESS REPUTATION & THE CYBER RISK

SMALL BUSINESS REPUTATION & THE CYBER RISK SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to

More information

Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a

Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a focus on cyber security Introduction and Executive summary From September

More information

Central and Eastern European Data Theft Survey 2012

Central and Eastern European Data Theft Survey 2012 FORENSIC Central and Eastern European Data Theft Survey 2012 kpmg.com/cee KPMG in Central and Eastern Europe Ever had the feeling that your competitors seem to be in the know about your strategic plans

More information

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

Capitalizing on Content: A Compelling ROI for Change

Capitalizing on Content: A Compelling ROI for Change Capitalizing on Content: A Compelling ROI for Change Sponsored by: About the As the non-profit association dedicated to nurturing, growing and supporting the user and supplier communities of ECM (Enterprise

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information