Survey highlights data protection efforts

Survey highlights data protection efforts

The data inside a company's walls is often the impetus behind IT security efforts. If companies did not have vital information, hackers would not bother to attack. However, that information is the lifeblood of a company and vital to continued successful operation. Forrester Research recently surveyed the progress companies have made keeping information safe in the current era of heightened risk and new computing methods.

Security highlights
Forrester analyst Heidi Shey explained that the survey found companies pouring significant effort and resources into keeping informational stores secure. More than nine in 10 companies called data security either a "high priority" or "critical" and backed their words up with budgetary action. Shey noted that companies used an average of 16 percent of their security budgets protecting data.

Many of the firms expressed interest in advanced techniques to ensure data remained secure. According to Shey, 24 percent of companies discussed plans to measure their vulnerability to data leaks. Through processes like penetration testing, modern firms can gain an exact snapshot of current system vulnerabilities. With attackers threatening companies through a variety of channels, such assessments could be crucial.

Shey also noted a difference between pure security and privacy efforts. While keeping files secure is centered in a specialized business unit, general privacy concerns affect departments throughout the corporate infrastructure.

Small companies feel risks
Small companies may be in more danger of data loss than their large counterparts from data loss. Hackers have begun to realize that even the smallest firms have data worth stealing, and the businesses have not caught up in efforts to keep it safe. A recent Heart Internet survey found that some small operations have lackluster security efforts, including 14 percent of businesses with no defenses at all protecting their websites, one of the key portals for cyberattacks.