60 per cent of firms use advanced technology without proper security

60 per cent of firms use advanced technology without proper security

More than three in five businesses are using the cloud, big data, the Internet of Things (IoT) and container environments without properly securing their sensitive data, according to a report.

Research by Thales e-Security found that 93 per cent of enterprises plan to use sensitive data with one of these advanced technologies at some point this year.

However, 63 per cent of those surveyed said that they believe their organisations are deploying the systems without having appropriate data security solutions in place.

Concerns over cloud security have dropped since 2016, with the percentage of firms worried about security breaches falling from 70 per cent to 59 per cent. Their other top cloud concerns were shared infrastructure vulnerabilities and lack of control of the location of data.

Meanwhile, 47 per cent of businesses are now using sensitive data in big data environments, where the concern voiced by 46 per cent of respondents was “sensitive data everywhere”, followed by the security of reports and privileged user access.

And IoT adoption is even higher, with 85 per cent of respondents using the technology and 31 per cent using it with sensitive data. 36 per cent said their top concern here was protecting the sensitive data generated, while 25 per cent have privacy concerns.

The most desired solution to these security risks is encryption, the report found, with 60 per cent of businesses saying they would increase their cloud deployments if providers offered data encryption in the cloud with enterprise key control.

The other popular choices were data encryption in general, cited by 56 per cent of respondents, and digital birth certificates with encryption technology, which 55 per cent pointed to.

“The digital world we live in, which encompasses everything from cloud to big data and the IoT, demands an evolution of IT security measures,” said Peter Galvin, vice president of strategy at Thales e-Security.

Copyright Lyonsdown Limited 2020

Top Articles

How the human immune system inspired a new approach to cyber-security

Artificial intelligence is being used to understand what’s ‘normal’ inside digital systems and autonomously fight back against cyber-threats

Solarwinds CEO blames former intern for hilarious password fiasco

SolarWinds has accused a former intern of creating a very weak password for its update server and storing it on a GitHub server for months.

Hackers accessed Npower customer accounts via a credential-stuffing attack

Npower suffered a major data breach that involved hackers using stolen passwords to gain access to a large number of customer accounts.

Related Articles