{"id":4342,"date":"2014-02-14T05:41:23","date_gmt":"2014-02-14T10:41:23","guid":{"rendered":"http:\/\/www.opensource.im\/?p=4342"},"modified":"2014-02-14T05:41:23","modified_gmt":"2014-02-14T10:41:23","slug":"data-breaches-drive-growth-in-use-of-encryption-global-study-finds","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/data-breaches-drive-growth-in-use-of-encryption-global-study-finds.php","title":{"rendered":"Data breaches drive growth in use of encryption, global study finds"},"content":{"rendered":"<p><p>    John E Dunn | Feb. 13, 2014  <\/p>\n<p>    But complex key management holds back some.  <\/p>\n<p>    Data breaches have for the first time become the main reason    enterprises implement encryption technology, according to a        study of global encryption trends by The Ponemon Institute    on behalf of security firm Thales e-Security.  <\/p>\n<p>    The firm found that 46 percent of the 4,800 enterprises and IT    managers questioned from around the world said that the main    reason they invested in encryption was that it could lessen the    impact of breaches. This beat a desire to protect brand    reputation on 44 percent and the 40 percent mentioning    compliance as the motivation.  <\/p>\n<p>    It's perhaps obvious that encryption makes stolen data less    useful to criminals but the growing importance placed on    protecting data rather than devices shows how the technology    has risen from being precautionary measure to that of a    frontline defence.  <\/p>\n<p>    Storing data without encryption, especially customer data, is    increasingly unthinkable with the US the most emphatic on this    for 59 percent of those questioned. Curiously, some countries    fall short of this enthusiasm with France in last place on 35    percent.  <\/p>\n<p>    The reason is mainly local legislation and compliance regimes,    with 61 percent of the US sample reporting that unencrypted    customer data would require breach notification as against 33    percent believing notification would be necessary if it was.  <\/p>\n<p>    On the face of it this is a bit surprising; many US    organisations appear to believe that breach notification would    not be required simply because the data had been encrypted. It    is not clear that this is true although the same divide appears    in all countries looked at.  <\/p>\n<p>    The study also uncovered the usual problems with deploying    encryption as well as identifying precisely where the sensitive    data resides for it to be applied.  <\/p>\n<p>    The figures also show that encryption use has doubled since the    report was first compiled in 2005, and was now present in 30    percent of organisations. Not surprisingly, financial services    leads the way with 43 percent making use of it.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerworld.com.sg\/tech\/security\/data-breaches-drive-growth-in-use-of-encryption-global-study-finds\/\" title=\"Data breaches drive growth in use of encryption, global study finds\">Data breaches drive growth in use of encryption, global study finds<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> John E Dunn | Feb. 13, 2014 But complex key management holds back some. Data breaches have for the first time become the main reason enterprises implement encryption technology, according to a study of global encryption trends by The Ponemon Institute on behalf of security firm Thales e-Security. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-4342","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/4342"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=4342"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/4342\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=4342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=4342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=4342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}