CompTIA Study: Hackers and Interconnectivity Among Top Security Complications
CompTIA recently released its Trends in Information Security Study, which revealed a number of interesting trends and findings including a list of complicating factors for security. Perhaps not surprisingly, the growing organization of hackers is identified as the top factor complicating security (54%). Followed closely behind hackers is greater tech interconnectivity (52%), which is also tied in second place with the sophistication of security threats.
The fact that tech interconnectivity is among the top three complicating factors may not be unexpected, but it is interesting in the context of the other two factors. Unlike hackers and sophisticated threats, which we normally cannot control – we can only protect against – tech interconnectivity is within our means to manage using today’s security technology. However, as the number of devices we use for work and communication multiplies, technology interconnectivity and security often appear as opposing forces.
A key element in the interconnectivity equation is email. Email remains the most prevalent form of communication in the business world. Every day, critical and sensitive data flows through business email, yet it is often among the least protected assets in a company. As we enable business email on more of our devices the risks increase. While a company’s security parameters may be protected from threats, the same is not always true for email. The moment content leaves the sender’s outbox or it is accessed via an unprotected device, information is no longer secure.
For these reasons, email encryption plays an important role in the security ecosystem. The challenge until more recently is that email encryption was not easy to implement or use. Key-based encryption, the architecture behind many encryption solutions, almost ironically causes a host of content management, regulatory and archiving challenges – many of which are necessary for security compliance. From an employee perspective, traditional encryption platforms often do not work inside regular email (and forget about encrypted email on a smartphone or tablet). Using them to send a message securely interrupts the natural workflow. People not only dislike using them they look for opportunities not to.
This brings us back to the tech interconnectivity challenge and why businesses see that as one of the top factors complicating security.
Fortunately for the business world the encryption world is making big advances. At Cirius, for example, we have tackled all of the hurdles above to offer a non-key-based encryption tool that secures content, is easy to use, supports compliance and offers a host of message control features.
We also couldn’t help but cheer to ourselves when we saw that more reliance on Internet applications is not top of the list on complicating factors. Only a few short years ago the opposite would have been true. Today however, a growing number of businesses are putting trust into cloud services and solutions as they prove more financially attractive and offer as much security if not more than their on-premise predecessors.
At Cirius, we know that cloud-based security has come a long way and we are doing our best to continue the momentum and drive innovation. We also know that both individually (as a company) and collectively (as part of a rapidly growing security industry) we still have much work to do to overcome these business challenges. For us at Cirius though, that work is just par for the course.