Tunisie-Nigéria (2-3) : La déception et des interrogations    CAN 2025 : Une victoire nigeriane pleine de suspense    TotalEnergies fait vibrer la Tunisie au rythme de la TotalEnergies CAF Coupe d'Afrique des Nations, Maroc 2025    Match Tunisie vs Nigeria : Où regarder le match de la CAN Maroc 2025 du 27 décembre ?    L'ATB et Visa International célèbrent les grands gagnants du jeu-concours ATB & Visa à l'occasion de la CAN Maroc 2025    CAN 2025 : suspense et émotions au rendez-vous ce samedi    SNCFT : 575 postes à pourvoir dans divers domaines    Tunis se prépare à accueillir 461 nouveaux bus venus de Chine    Douane : dernier délai pour régulariser voitures et motos le 30 décembre    L'ATB et Visa International célèbrent les grands gagnants du jeu-concours ATB & Visa à l'occasion de la CAN Maroc 2025    Diaspora tunisienne : comment la Tunisie peut-elle séduire à nouveau ses talents expatriés?    Salon de l'Entrepreneuriat RIYEDA : autonomiser pour entreprendre et inclure    QNB organise des ateliers financiers pour les élèves de l'école primaire «El Chedly Khaznadar» à Ezzahra    Grand concert du nouvel An à Tunis : l'Orchestre symphonique Tunisien au théâtre de l'opéra (Programme)    IQOS ILUMA i lancée en Tunisie par Philip Morris International : transition vers un avenir sans fumée    Festival international du Sahara 2025 à Douz : tourisme et artisanat au cœur de la 57e édition    Météo en Tunisie : pluies orageuses sur le Nord et localement sur le Centre    Fin de la vignette : payez vos droits de circulation autrement dès 2026    De la harissa familiale aux étals du monde : l'incroyable épopée de Sam Lamiri    IACE - Premier rapport national sur l'Entreprise: Pour un nouveau pacte productif    De l'invisibilité à l'hyper-visibilité: le voile dans l'imaginaire onusien    Les couleurs du vivant: Quand la biologie et l'art se rencontrent    Tunisie-Japon : SAITO Jun prend ses fonctions et promet un nouvel élan aux relations bilatérales    Festival Saliha de la musique tunisienne à la ville du Kef : ateliers, concerts et spectacles (programme)    Météo en Tunisie : mer agitée, températures en légère hausse    Kaïs Saïed : seule l'action sur le terrain fera office de réponse    Séisme de 6,1 à Taïwan : sud-est secoué sans dégâts signalés    Crash près d'Ankara : le chef d'état-major libyen tué    CAN 2025 - Tunisie-Ouganda : Un avant-goût de conquête    Yadh Ben Achour reçoit le prix Boutros Boutros-Ghali pour la Diplomatie, la Paix et le développement (Vidéo)    Tunisie Telecom lance sa campagne institutionnelle nationale «Le Don des Supporters»    Match Tunisie vs Ouganda : où regarder le match de la CAN Maroc 2025 du 23 décembre?    Choc syndical : Noureddine Taboubi démissionne de l'UGTT    Riadh Zghal: Le besoin de sciences sociales pour la gestion des institutions    Tunisie à l'honneur : LILY, film 100% IA, brille sur la scène mondiale à Dubaï    Nabeul accueille le festival international Neapolis de théâtre pour enfants    Cérémonie de clôture de la 36ème session des journées cinématographiques de Carthage (Album Photos)    Décès de Somaya El Alfy, icône du cinéma et du théâtre égyptiens    Le carcadé: Une agréable boisson apaisante et bienfaisante    CAN Maroc 2025 : programme des matchs de la Tunisie, préparatifs et analyse des chances    France : nouvel examen civique obligatoire pour tous les étrangers dès 2026    Elyes Ghariani - Le Style Trump: Quand l'unilatéralisme redéfinit le monde    Slaheddine Belaïd: Requiem pour la défunte UMA    Comment se présente la stratégie américaine de sécurité nationale 2025    La Poste Tunisienne émet des timbres-poste dédiés aux plantes de Tunisie    Sonia Dahmani libre ! Le SNJT renouvèle sa demande de libération des journalistes Chadha Haj Mbarek, Mourad Zghidi et Bourhen Bssaies    Secousse tellurique en Tunisie enregistrée à Goubellat, gouvernorat de Béja    New York en alerte : décès de deux personnes suite à de fortes précipitations    







Merci d'avoir signalé!
Cette image sera automatiquement bloquée après qu'elle soit signalée par plusieurs personnes.



Businesses Collect More Data Than They Can Handle, Reveals Gemalto
Publié dans L'expert le 12 - 07 - 2018

* 65% of organizations can't analyze or categorize all the consumer data they store
* 68% of IT professionals believe their organizations are failing to carry out all procedures in line with data protection laws
* Only 54% of companies know where all of their sensitive data is stored
AMSTERDAM–(BUSINESS WIRE/AETOSWire)– With pressure to ensure consumer data is protected mounting, Gemalto, the world leader in digital security, today released the results of a global study which reveals that two in three companies (65%) are unable to analyze all the data they collect and only half (54%) of companies know where all of their sensitive data is stored. Compounding this uncertainty, more than two thirds of organizations (68%) admit they don't carry out all the procedures in line with data protection laws such as GDPR.
These are just some of the findings of the fifth-annual Data Security Confidence Index, which surveyed 1,050 IT decision makers and 10,500 consumers worldwide. The research found that business' ability to analyze the data they collect varies worldwide with India (55%) and Australia (47%) best at using the data they collect. In fact, despite nine in 10 (89%) global organizations agreeing that analyzing data effectively gives them a competitive edge, only one in five Benelux (20%) and British (19%) companies are able to do so.
"If businesses can't analyze all of the data they collect, they can't understand the value of it – and that means they won't know how to apply the appropriate security controls to that data," says Jason Hart, vice president and CTO for Data Protection at Gemalto. "Whether it's selling it on the dark web, manipulating it for financial gain or to damage reputations, unsecured data is a goldmine for hackers. You only need to look at the recent hacks on the World Anti-Doping Agency and International Luge Federation to see the damage that can be done. What's more, data manipulation can take years to discover, and with data informing everything from business strategy to sales and product development, its value and integrity cannot be underestimated."
Confidence in securing the breach is low
When it comes to how data is being secured, the study found that almost half (48%) of IT professionals say perimeter security is effective at keeping unauthorized users out of their networks. This is despite the majority of IT professionals (68%) believing unauthorized users can access their corporate networks, with Australian companies being the most likely (84%) and the UK the least (46%). However, once the hackers are inside, less than half of companies (43%) are extremely confident that their data would be secure. UK businesses are the most concerned with just 24% prepared to say they're extremely confident, with Australia the highest (65%).
Even though there is still faith in how they're securing their networks, one third (27%) of companies reported that their perimeter security had been breached in the past 12 months. Of those that had suffered a breach at some point, only 10% of that compromised data was protected by encryption, leaving the rest exposed.
Consumers say compliance is critical
According to the study, a growing awareness of data breaches and communications around GDPR have led to the majority (90%) of consumers believing that it is important for organizations to comply with data regulations. In fact, over half (54%) are now aware what encryption is, showing an understanding of how their data should be protected.
Hart continues, "It's time organizations got their houses in order; starting with who oversees their data security. A central figure such as a Data Protection Officer – essential in some circumstances under GDPR – must be appointed to the board to lead data security from the top down. Next is having more insight and analysis on the data collected to ensure that it is both correctly protected and enabling more informed business decision making. Finally, a mindset change. Organizations must realize that it's no longer a case of if, but when a breach occurs, and protect their most valuable asset – data – through encryption, two-factor authentication and key management, rather than solely focusing on perimeter protection."
Additional Resources
* Visit the Data Security Confidence Index website for the full report, infographic and regional data
* For more information on Gemalto's Data Security solutions, click here.
About Gemalto
Gemalto (Euronext NL0000400653 GTO) is the global leader in digital security, with 2017 annual revenues of €3 billion and customers in over 180 countries. We bring trust to an increasingly connected world.
From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between.
Gemalto's solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.
Our 15,000 employees operate out of 114 offices, 40 personalization and data centers, and 35 research and software development centers located in 47 countries.


Cliquez ici pour lire l'article depuis sa source.