{"id":1458,"date":"2018-07-12T07:16:39","date_gmt":"2018-07-12T07:16:39","guid":{"rendered":"http:\/\/madhousereport.com\/?p=1458"},"modified":"2018-07-12T07:16:39","modified_gmt":"2018-07-12T07:16:39","slug":"businesses-collect-data-can-handle-reveals-gemalto","status":"publish","type":"post","link":"https:\/\/theblogonline.com\/?p=1458","title":{"rendered":"Businesses Collect More Data Than They Can Handle, Reveals Gemalto"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">65% of organizations can\u2019t analyze or categorize all the consumer data they store<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">68% of IT professionals believe their organizations are failing to carry out all procedures in line with data protection laws <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Only 54% of companies know where all of their sensitive data is stored <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">AMSTERDAM-(<a href=\"http:\/\/www.businesswire.com\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">BUSINESS WIRE<\/span><\/a>\/<a href=\"http:\/\/aetoswire.com\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s3\">AETOSWire<\/span><\/a>)&#8211; With pressure to ensure consumer data is protected mounting, Gemalto, the world leader in digital security, today released the results of a global study which reveals that two in three companies (65%) are unable to analyze all the data they collect and only half (54%) of companies know where all of their sensitive data is stored. Compounding this uncertainty, more than two thirds of organizations (68%) admit they don\u2019t carry out all the procedures in line with data protection laws such as GDPR. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">These are just some of the findings of the fifth-annual <a href=\"http:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-security-confidence-index%252F%253Futm_campaign%253Ddsci%2526utm_medium%253Dpress-release%2526utm_source%253D%2526utm_content%253Dreport%2526utm_term%253D&amp;esheet=51832500&amp;newsitemid=20180709005053&amp;lan=en-US&amp;anchor=Data+Security+Confidence+Index&amp;index=1&amp;md5=e82290ff2aa59af8c5acb51635c00fb7\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">Data Security Confidence Index<\/span><\/a>, which surveyed 1,050 IT decision makers and 10,500 consumers worldwide. The research found that business\u2019 ability to analyze the data they collect varies worldwide with India (55%) and Australia (47%) best at using the data they collect. In fact, despite nine in 10 (89%) global organizations agreeing that analyzing data effectively gives them a competitive edge, only one in five Benelux (20%) and British (19%) companies are able to do so. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u201cIf businesses can\u2019t analyze all of the data they collect, they can\u2019t understand the value of it \u2013 and that means they won\u2019t know how to apply the appropriate security controls to that data,\u201d says Jason Hart, vice president and CTO for Data Protection at Gemalto. \u201cWhether it\u2019s selling it on the dark web, manipulating it for financial gain or to damage reputations, unsecured data is a goldmine for hackers. You only need to look at the recent hacks on the World Anti-Doping Agency and International Luge Federation to see the damage that can be done. What\u2019s more, data manipulation can take years to discover, and with data informing everything from business strategy to sales and product development, its value and integrity cannot be underestimated.\u201d <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><b>Confidence in securing the breach is low<\/b><br \/>\nWhen it comes to how data is being secured, the study found that almost half (48%) of IT professionals say perimeter security is effective at keeping unauthorized users out of their networks. This is despite the majority of IT professionals (68%) believing unauthorized users can access their corporate networks, with Australian companies being the most likely (84%) and the UK the least (46%). However, once the hackers are inside, less than half of companies (43%) are extremely confident that their data would be secure. UK businesses are the most concerned with just 24% prepared to say they\u2019re extremely confident, with Australia the highest (65%). <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Even though there is still faith in how they\u2019re securing their networks, one third (27%) of companies reported that their perimeter security had been breached in the past 12 months. Of those that had suffered a breach at some point, only 10% of that compromised data was protected by encryption, leaving the rest exposed. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><b>Consumers say compliance is critical<\/b><br \/>\nAccording to the study, a growing awareness of data breaches and communications around GDPR have led to the majority (90%) of consumers believing that it is important for organizations to comply with data regulations. In fact, over half (54%) are now aware what encryption is, showing an understanding of how their data should be protected. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Hart continues, \u201cIt\u2019s time organizations got their houses in order; starting with who oversees their data security. A central figure such as a Data Protection Officer \u2013 essential in some circumstances under GDPR \u2013 must be appointed to the board to lead data security from the top down. Next is having more insight and analysis on the data collected to ensure that it is both correctly protected and enabling more informed business decision making. Finally, a mindset change. Organizations must realize that it\u2019s no longer a case of if, but when a breach occurs, and protect their most valuable asset \u2013 data \u2013 through encryption, two-factor authentication and key management, rather than solely focusing on perimeter protection.\u201d <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Additional Resources <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Visit the Data Security Confidence Index <a href=\"http:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-security-confidence-index%252F%253Futm_campaign%253Ddsci%2526utm_medium%253Dpress-release%2526utm_source%253D%2526utm_content%253Dreport%2526utm_term%253D&amp;esheet=51832500&amp;newsitemid=20180709005053&amp;lan=en-US&amp;anchor=website&amp;index=2&amp;md5=9e912b2e4d4eb12811c3a900f0d8f8c6\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">website<\/span><\/a> for the full report, infographic and regional data <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">For more information on Gemalto\u2019s Data Security solutions, click <a href=\"http:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-protection%252F&amp;esheet=51832500&amp;newsitemid=20180709005053&amp;lan=en-US&amp;anchor=here&amp;index=3&amp;md5=fa3ce8721da0f528ef7b79c38f64dfdb\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">here<\/span><\/a>. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><b>About Gemalto<\/b> <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Gemalto (Euronext NL0000400653 GTO) is the global leader in <a href=\"http:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fwww.gemalto.com%252Fcompanyinfo&amp;esheet=51832500&amp;newsitemid=20180709005053&amp;lan=en-US&amp;anchor=digital+security&amp;index=4&amp;md5=242f9cbc8cf6e8b0205f1c21a2375a32\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">digital security<\/span><\/a>, with 2017 annual revenues of \u20ac3 billion and customers in over 180 countries. We bring trust to an increasingly connected world. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Gemalto\u2019s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software \u2013 enabling our clients to deliver secure digital services for billions of individuals and things. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Our 15,000 employees operate out of 114 offices, 40 personalization and data centers, and 35 research and software development centers located in 47 countries. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">For more information visit <a href=\"http:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fwww.gemalto.com&amp;esheet=51832500&amp;newsitemid=20180709005053&amp;lan=en-US&amp;anchor=www.gemalto.com&amp;index=5&amp;md5=c86b38da515e8c153cb1179df2956b57\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">www.gemalto.com<\/span><\/a>, or follow <a href=\"http:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Ftwitter.com%252Fgemalto&amp;esheet=51832500&amp;newsitemid=20180709005053&amp;lan=en-US&amp;anchor=%2540gemalto&amp;index=6&amp;md5=221b2ad39ebfd3b771507fcc2a46049e\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">@gemalto<\/span><\/a> on Twitter. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">This press release features multimedia. View the full release here: <a href=\"https:\/\/www.businesswire.com\/news\/home\/20180709005053\/en\/\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">https:\/\/www.businesswire.com\/news\/home\/20180709005053\/en\/ <\/span><\/a><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>*Source: <\/b><a href=\"http:\/\/aetoswire.com\/news\/6567\/en\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s3\">AETOSWire<\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>65% of organizations can\u2019t analyze or categorize all the consumer data they store 68% of IT professionals believe their organizations are failing to carry out all procedures in line with data protection laws Only 54% of companies know where all of their sensitive data is stored AMSTERDAM-(BUSINESS WIRE\/AETOSWire)&#8211; With pressure to ensure consumer data is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1459,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[922,1196,918],"class_list":["post-1458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-aetoswire","tag-amsterdam","tag-gemalto"],"_links":{"self":[{"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/posts\/1458"}],"collection":[{"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/theblogonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1458"}],"version-history":[{"count":1,"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/posts\/1458\/revisions"}],"predecessor-version":[{"id":1460,"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/posts\/1458\/revisions\/1460"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/media\/1459"}],"wp:attachment":[{"href":"https:\/\/theblogonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/theblogonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/theblogonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}