Fortes variations météorologiques : chaleur, fraîcheur et orages en vue    Nesrine Ben Ali condamnée en Suisse : vols, violences et séjour illégal révélés à Genève    Crédits agricoles sans garanties : une nouvelle opportunité en Tunisie    Tunisie – Bac 2026 : cours de soutien scolaire en ligne via la plateforme gratuite Joussour    hôpital Mongi Slim La Marsa : lancement de la plateforme nationale de déclaration des naissances    Bientôt la fin du « changuel » ?    L'or vert tunisien explose les records à Genève : une victoire historique    Coupe de Tunisie : à quelle date se tient le tirage au sort ?    MY FIRST DOC 2026 : à Nabeul, le festival du film documentaire comme acte de résistance et de voyage    Driss Guiga, l'ancien ministre et avocat tunisien est décédé    Le Ribat de Sousse et le Musée archéologique de Sousse abritent le symposium "Le Céramiste du Musée"    À ne pas manquer : toutes les dates des jours fériés 2026    Neïla Chaabane - Le professeur Sadok Belaïd nous a appris à réfléchir et à questionner la règle de droit    Tunisie : vers la fin des guichets, le registre des entreprises passe au tout numérique en 2026    Driss Guiga, ancien ministre de Bourguiba, est décédé    Qui était Driss Guiga, ancien ministre décédé ce dimanche    L'Union Internationale de Banques renforce sa proximité avec les PME et confirme son rôle de partenaire engagé    Hajj 2026 : une amende de 20 000 riyals pour les contrevenants    Espérance vs Sundowns : où regarder le match en direct ?    Foire du Livre de Tunis, FILT 2026 : plus d'exposants, nouveautés et l'Indonésie invitée d'honneur    Fonction Audio Eraser avec la série Galaxy S26 : pour une immersion totale sur toutes les plateformes de streaming    Tunisie : lancement de l'exercice militaire multinational ''African Lion 2026''    Météo en Tunisie : températures en légère hausse    La menthe verte: Fraîcheur, traditions et art de vivre    À quelle heure se joue Sundowns–Espérance en demi-finale retour ?    Visite nocturne surprise de la ministre de la Justice à Ben Arous    Passerelles Savoirs-Médias : la FTDJ, SavoirsEco et Expertise France engagent une dynamique inédite pour rapprocher recherche et médias en Tunisie    La Cité des Sciences à Tunis accueille le Cosmonaute russe Kirill Peskov    QNB publie des résultats solides au premier trimestre 2026 malgré un contexte régional tendu    Etude : une sœur "bavarde" protège du stress et améliore le bien-être    Riadh Zghal: L'IA, une opportunité pour l'innovation et la révision de la pédagogie universitaire    Agil Energy met à l'épreuve ses dispositifs de gestion de crise lors d'une opération blanche à dimension internationale    Liverpool vs PSG et Atlético de Madrid vs FC Barcelone : ou regarder les demi-finales de Ligue des Champions UEFA    Recrutement de travailleurs tunisiens : la Tunisie et l'Italie signent un accord    Inauguration de Isharat Gallery à Sid Bou Saïd: une réhabilitation lumineuse de l'abstraction tunisienne    Tahar Ben Lakhdar - Sadok Belaïd,L'architecte silencieux d'une réforme qui a changé la Tunisie: Comment la réforme des études d'ingénieurs des années 1990-1991 a refondé le paysage de l'enseignement supérieur tunisien    Général Mohamed Nafti - Trois Lettres Persanes    El Kazma et K-off : Sous le signe du rire, la résilience et la réflexion    9 avril : Musées et sites historiques gratuits en Tunisie    Match PSG vs Liverpool : où regarder le match des Quarts de finale aller de la ligue des champions UEFA du 08 avril    Vidéo-Buzz : la pub LEGO spécial Coupe du monde 2026 avec les stars du foot : secrets de tournage    Analyse - Récupération en Iran: «Il faut sauver le pilote Ryan»    Augmentation tarifs Musées Tunisie 2026 : Agences de voyage en colère    Gouverner dans le brouillard permanent: les trois qualités du dirigeant de demain    Artémis II lancée : une mission spatiale habitée vers la lune, plus de 50 ans après Apollo 17    Mohamed Nafti: L'engrenage de la destruction    L'effet Jaouadi ou le triomphe de l'excellence opérationnelle    Sabri Lamouchi : Une bonne nouvelle impression (Album photos)    







Merci d'avoir signalé!
Cette image sera automatiquement bloquée après qu'elle soit signalée par plusieurs personnes.



Businesses Collect More Data Than They Can Handle, Reveals Gemalto
Publié dans L'expert le 12 - 07 - 2018

* 65% of organizations can't analyze or categorize all the consumer data they store
* 68% of IT professionals believe their organizations are failing to carry out all procedures in line with data protection laws
* Only 54% of companies know where all of their sensitive data is stored
AMSTERDAM–(BUSINESS WIRE/AETOSWire)– With pressure to ensure consumer data is protected mounting, Gemalto, the world leader in digital security, today released the results of a global study which reveals that two in three companies (65%) are unable to analyze all the data they collect and only half (54%) of companies know where all of their sensitive data is stored. Compounding this uncertainty, more than two thirds of organizations (68%) admit they don't carry out all the procedures in line with data protection laws such as GDPR.
These are just some of the findings of the fifth-annual Data Security Confidence Index, which surveyed 1,050 IT decision makers and 10,500 consumers worldwide. The research found that business' ability to analyze the data they collect varies worldwide with India (55%) and Australia (47%) best at using the data they collect. In fact, despite nine in 10 (89%) global organizations agreeing that analyzing data effectively gives them a competitive edge, only one in five Benelux (20%) and British (19%) companies are able to do so.
"If businesses can't analyze all of the data they collect, they can't understand the value of it – and that means they won't know how to apply the appropriate security controls to that data," says Jason Hart, vice president and CTO for Data Protection at Gemalto. "Whether it's selling it on the dark web, manipulating it for financial gain or to damage reputations, unsecured data is a goldmine for hackers. You only need to look at the recent hacks on the World Anti-Doping Agency and International Luge Federation to see the damage that can be done. What's more, data manipulation can take years to discover, and with data informing everything from business strategy to sales and product development, its value and integrity cannot be underestimated."
Confidence in securing the breach is low
When it comes to how data is being secured, the study found that almost half (48%) of IT professionals say perimeter security is effective at keeping unauthorized users out of their networks. This is despite the majority of IT professionals (68%) believing unauthorized users can access their corporate networks, with Australian companies being the most likely (84%) and the UK the least (46%). However, once the hackers are inside, less than half of companies (43%) are extremely confident that their data would be secure. UK businesses are the most concerned with just 24% prepared to say they're extremely confident, with Australia the highest (65%).
Even though there is still faith in how they're securing their networks, one third (27%) of companies reported that their perimeter security had been breached in the past 12 months. Of those that had suffered a breach at some point, only 10% of that compromised data was protected by encryption, leaving the rest exposed.
Consumers say compliance is critical
According to the study, a growing awareness of data breaches and communications around GDPR have led to the majority (90%) of consumers believing that it is important for organizations to comply with data regulations. In fact, over half (54%) are now aware what encryption is, showing an understanding of how their data should be protected.
Hart continues, "It's time organizations got their houses in order; starting with who oversees their data security. A central figure such as a Data Protection Officer – essential in some circumstances under GDPR – must be appointed to the board to lead data security from the top down. Next is having more insight and analysis on the data collected to ensure that it is both correctly protected and enabling more informed business decision making. Finally, a mindset change. Organizations must realize that it's no longer a case of if, but when a breach occurs, and protect their most valuable asset – data – through encryption, two-factor authentication and key management, rather than solely focusing on perimeter protection."
Additional Resources
* Visit the Data Security Confidence Index website for the full report, infographic and regional data
* For more information on Gemalto's Data Security solutions, click here.
About Gemalto
Gemalto (Euronext NL0000400653 GTO) is the global leader in digital security, with 2017 annual revenues of €3 billion and customers in over 180 countries. We bring trust to an increasingly connected world.
From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between.
Gemalto's solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.
Our 15,000 employees operate out of 114 offices, 40 personalization and data centers, and 35 research and software development centers located in 47 countries.


Cliquez ici pour lire l'article depuis sa source.