Content related to ‘privacy’

One in Three Companies Lacks Policies for Information Security, Data Encryption and Classification

real street tech square logo v1. Posted on:

SOURCE Protiviti At a time when cybersecurity breaches are becoming more frequent and significant, organizations are continuing to place a high priority on improving their cybersecurity frameworks. However, despite improvement in many areas, one in three companies still lacks policies for its information security, data encryption and data classification, according to The Battle Continues – Working to Bridge the Data Security Chasm: Assessing the Results of Protiviti 2015 IT Security and Privacy Survey from global consulting firm Protiviti. “It’s no stretch to state that the spectrum and sophistication of cyberattacks and the diversification of their origin will continue to increase,” said Cal Slemp, a Protiviti managing director with the firm’s global cybersecurity practice. “Companies appear intent on addressing data security issues, but are these intentions translating into effective policies and actions to secure organizations’ most valuable data? The results are mixed, at best, according to our 2015 survey. It’s increasingly important for organizations to avoid complacency and consistently enhance their infrastructure, data frameworks and response plans to protect, mitigate and manage potential breaches.” The IT security and privacy survey, which gathered insights from 708 Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, IT vice presidents and directors and other IT management professionals, assesses security and privacy policies, data governance, data retention and storage, data destruction policies, and third-party vendors and access, among other topics that organizations need to manage and improve. Protiviti’s report also includes recommended actions for IT leaders as well as trends to watch. Key findings from the 2015 survey include: “Tone from the top” is a critical differentiator – From strong board engagement in information security to management establishing “best practice” policies, effective security starts with the right tone from the top, which is as important as any policy. Only 28 percent of organizations indicated that there is currently a high level of engagement by the board (compared to 30 percent in the 2014 survey). A strong security foundation must include the right policies – Organizations that have all of their “core” information security policies in place – including acceptable use, data encryption and… NOTE:This is a summary of a post found on Real Street Tech | The Smart Place For CRE.Parts of it may be missing. View the full original article at: