Do Your End Users Care About Security? I Doubt It.

News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
Data Security

Do Your End Users Care About Security? I Doubt It.

Security has become the greatest inhibitor to cloud adoption, and still looms as an unaddressed issue.

Organizations have invested significant sums to protect their perimeters, but are not deploying mechanisms that can stop a security incident from occurring internally. Year after year, statistics prove that end users are responsible, either accidently or deliberately, for the majority of data breaches – 68 percent of breaches, in fact.

You can protect at the document level, but identifying a security violation that is contained within the content of the document, when it is created, ingested, or even attached to an email, provides a more granular and safer approach, as all privacy and confidential content will be proactively identified and protected.

Attachments, faxes, scans, and emails may all contain security or confidential information that must also be protected. It takes only one person to cause a data breach. 

The Concept Searching metadata framework and conceptTaxonomyWorkflow provide the tools to proactively stop data breaches before they happen, identifying existing vulnerabilities. Although most security software solutions provide standard descriptors, Concept Searching’s also provide the ability to associate text with descriptors.

Using Concept Searching tools, organizations are not limited to standard descriptors, such as credit card number, PII, PHI, and social security numbers, but can define any content that is confidential to them, such as financial information, engineering drawings, or new product information.

This flexibility allows rules to be designed, to remove items from search, send to a secure repository, send to an application, prevent portability, or send to the person responsible. Additional rules can be defined to further process the content in question.

Why the Problem?

88% of security breaches are attributed to negligence (Wharton Information Security Best Practices)

80% of employees use unsecure file sharing methods, putting corporate data at risk (Workshare)

Hidden data in documents accounts for the highest number of exposures

How Much is it Costing?

The average cost of a data breach is $4 million, and 70% of data breaches are caused by internal employees (Ponemon Institute and IBM)

The average cost of a record involved in a data breach is $158 (Ponemon Institute)

Brand loss averages $3.3 million plus the cost of the breach (Ponemon Institute)

Intelligent Content in Context

Elimination of manual tagging ensures content is shared by authorized staff

Eliminates help desk issues, inbound communications, investigations, remediation, legal costs, product discounts, to mitigate breach, and brand damage – average cost is $1.07 million (IBM) 

The inability to identify meaningful word strings from within content can open a Pandora’s box of problems in conjunction with cyber security. What do you think?

Our webinars also address the topics explored in our blogs. Access all our webinar recordings and presentation slides at any time, from our website, in the Recorded Webinars area, via the Resources tab.

Concept Searching