Are You Prepared for BusiLeaks?

Dec. 16, 2010
Mobile workforces, cloud computing and social networking pose significant threats to IT security.

In the era of WikiLeaks, it's no wonder that business executives are feeling less secure about their organizations' data. A recent study by Ernst & Young found that 60% of those polled perceive increased risk from the use of social networking, cloud computing and personal mobile devices at work.

"Organizations are operating in a world that requires borderless security," warns Bernie Wedge, an IT risk practice leader at Ernst & Young. "Information access by employees using mobile devices, or items that are maintained and accessed by customers, vendors or other business partners, are considered outside traditional borders. Therefore, companies must think about security beyond their employees, data centers and firewalls."

The study found organizations recognize the risks that come with emerging technology trends and are taking steps to protect information with stronger security programs. Half of the senior executives surveyed said they expect to spend more on data leakage/data loss prevention efforts over the next year. Still, facing continuing economic pressures, companies also want to reduce their overall IT spend and are looking to cloud computing services as a solution. The risk associated with cloud computing include data leakage; 52% of executives identified it as the largest associated risk. Some 39% cite the lost visibility of company data as an increased risk of cloud-based computing.

Information security is shifting from a technology-only approach to one that includes technology and people, the study shows. All employees have a role in information security and organizations need to clearly communicate their responsibilities. People and organizations "outside the borders of the traditional corporate environment play a role in helping to achieve information security objectives, but can also pose a risk to protecting your information," says Jose Granado, an information security expert at Ernst & Young. "A comprehensive IT risk management program must focus on people, processes and technology to address information throughout its lifecycle, wherever it resides."

See Also:
Finding the Business Case for Diversity
10 Key Challenges for CEOs

Popular Sponsored Recommendations

Why DataOps may be the key to unlocking the full potential of digital transformation

Nov. 3, 2023
Read the 2023 market survey conducted by IndustryWeek

Industry Insights: The Use of Private Cellular Networks in Manufacturing

Aug. 14, 2023
Private 5G cellular networks equip manufacturers with a powerful technology, improving their operations, increasing their security and accelerating their digital transformation...

You Cannot Stay Competitive by Bolting New Technologies to a Legacy ERP

Oct. 20, 2023
Read this white paper to understand the benefits of shifting to a next-generation ERP system as part of a DOP.

Gain a competitive edge with real-world lessons on private 5G networks

Nov. 16, 2023
The use of private networks in manufacturing applications is rapidly growing. In this paper, we present valuable insights and lessons learned from the field with the goal of enhancing...

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!