{"id":4727,"date":"2014-02-16T04:41:44","date_gmt":"2014-02-16T09:41:44","guid":{"rendered":"http:\/\/www.opensource.im\/?p=4727"},"modified":"2014-02-16T04:41:44","modified_gmt":"2014-02-16T09:41:44","slug":"data-breaches-boost-interest-in-encryption-study-says","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/data-breaches-boost-interest-in-encryption-study-says.php","title":{"rendered":"Data breaches boost interest in encryption, study says"},"content":{"rendered":"<p><p>    Data breaches    have for the first time become the main reason businesses    implement encryption technology, according to a     study of global encryption trends by The Ponemon Institute    on behalf of security firm Thales e-Security.  <\/p>\n<p>    The firm found    that 46 percent of the 4800 companies and tech managers    questioned from around the world said that the main reason they    invested in encryption was that it could lessen the impact of breaches.    This beat a desire to protect brand reputation on 44 percent    and the 40 percent mentioning compliance as the    motivation.  <\/p>\n<p>    Its perhaps    obvious that     encryption makes stolen data less useful to criminals but    the growing importance placed on protecting data rather than    devices shows how the technology has risen from being    precautionary measure to that of a frontline defence.  <\/p>\n<p>    Storing data    without encryption, especially customer data, is increasingly    unthinkable to many of the respondents, with the U.S. the most    emphatic on this point, noted by 59 percent of those    questioned. Curiously, some countries fall short of this    enthusiasm with France in last place on 35 percent.  <\/p>\n<p>    The reason is    mainly local legislation and compliance regimes, with 61    percent of the U.S. sample reporting that unencrypted customer    data would     require breach notification as against 33 percent believing    notification would be necessary if it was.  <\/p>\n<p>    On the face of it    this is a bit surprising; many U.S. organizations appear to    believe that breach notification would not be required simply    because the data had been encrypted. It is not clear that this    is true although the same divide appears in all countries    looked at.  <\/p>\n<p>    The study also    uncovered the usual problems with deploying encryption as well    as identifying precisely where the sensitive data resides for    it to be applied.  <\/p>\n<p>    The figures also    show that encryption use has doubled since the report was first    compiled in 2005, and was now present in 30 percent of    organizations. Not surprisingly, financial services leads the    way with 43 percent making use of it.  <\/p>\n<p>    Arguably,    encryption use should be much higher. A major barrier remains    the complexity of key management. This can also be hugely    expensive, or at least firms believe it will be.  <\/p>\n<p>    Encryption usage    continues to be a clear indicator of a strong security posture    but there appears to be emerging evidence that concerns over    key management are becoming a barrier to its more widespread    adoption, said Dr. Larry Ponemon, founder of the Ponemon    Institute.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2097998\/data-breaches-boost-interest-in-encryption-study-says.html\" title=\"Data breaches boost interest in encryption, study says\">Data breaches boost interest in encryption, study says<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Data breaches have for the first time become the main reason businesses implement encryption technology, according to a study of global encryption trends by The Ponemon Institute on behalf of security firm Thales e-Security. The firm found that 46 percent of the 4800 companies and tech managers questioned from around the world said that the main reason they invested in encryption was that it could lessen the impact of breaches<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-4727","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/4727"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=4727"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/4727\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=4727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=4727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=4727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}