With a new company falling victim to a cyberattack or data breach seemingly every day, the ability to protect business and customer information may soon emerge as a distinguishing factor among market leaders.
The modern business has to defend against threats coming from all angles and all sources. From ensuring physical security with server room surveillance to identifying network intrusions and eliminating internal data breaches, information security professionals have their hands full.
A recent Websense survey of IT professionals was able to put a quantifiable value on the stress felt across the data security community. According to the report, 86 percent of respondents indicated that a serious security incident could put their jobs in jeopardy. Additionally, approximately seven in 10 suggested that the pressures of corporate data management were more stressful than either managing personal debt or going through a divorce.
These concerns may be well-founded, however, when taken in conjunction with the study’s separate findings. Among the 1,000 IT managers surveyed, only half of respondents indicated that their organizations had systems in place to prevent the unauthorized uploading of confidential data. Also, just 2 percent said they have a comprehensive data loss prevention tool that protected their information at all stages of transit across the company network.
However, these risks also contain significant market opportunities. Companies that can assert a strong stance on data security – and back it up in practice – may stand above the competition.
“If you choose to adopt this competitive differentiator, consider this caveat. Many of the businesses succumbing to being compromised were actually meeting regulatory and contractual requirements,” suggested Financial Times contributors Eric Openshaw and Irfan Saif. “Consequently, your firm’s informed view of the true risks should be the higher bar – the better security standard you promise your customers.”
To assume this desirable position, Openshaw and Saif indicated the organizations must first bridge the divide between IT managers and top-level business executives to ensure all department are contributing to – and accountable for – data protection strategies.
“To be thorough, consistent and efficient, take a cross-functional approach to finding and prioritizing risk,” Openshaw and Saif explained. “Break the silo-centered systems that cost additional time, money and resources, and often can sacrifice quality.”
Once key assets have been identified, administrators are encouraged to align their strategies to defend against threats, monitor network activity and respond swiftly and appropriately should an incident occur.
By satisfying these objectives, companies can achieve robust data security while potentially enjoying the parallel benefits of enhanced industry standing.
Security News from SimplySecurity.com by Trend Micro