Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Encryption deployments favoured by IT professionals

2/03/2016 by Sharon Shahzad

W1siziisijiwmtyvmdmvmdivmtavmtkvntevmjy3l01vzgvybib0zwnobm9sb2d5lcbjb2rligdyyxboawmuanbnil0swyjwiiwidgh1bwiilci2mdb4ndawxhuwmdnlil1d

A new study has found that many IT professionals are targeting encryption deployments as part of their future strategy. In the survey of over 5,000 individuals, Thales e-Security found that consumer concerns, privacy compliance regulations and cyber-attacks have affected the market and made encrypted data increasingly essential for companies. However, though the awareness surrounding encryption is rising, it’s important for firms to act on this knowledge and put consistent, long-term security in place.

As part of the “2016 Global Encryption Trends Study”, it was shown that the majority of firms want to move their sensitive data into the cloud over the coming two years. In fact, 56 per cent of those questioned said they were already moving confidential data sets to the cloud, with this figure expected to rise towards 84 per cent by 2018. Respondents also revealed that a large portion of this information involves HR and employee details. Meanwhile, IT executives also revealed that they rate on-premise and cloud deployment support as one of the most important factors when getting a new system up and running. Finally, it also seems as if companies are waking up to the risks of employee mistakes, with this being the top perceived threat for the exposure of data. This was followed by application or system malfunction, with malicious insiders and external attacks lower on the list.

Thales Vice President of Strategy Peter Galvin said: “As businesses increasingly turn to cloud services, we're seeing a rapid rise in sensitive or confidential data being transferred to the cloud and yet only a third of respondents had an overall, consistently applied encryption strategy. Encryption is now widely accepted as best-practice for protecting data, and a good encryption strategy depends on well-implemented encryption and proper key management.”

Despite the results, the report highlighted that awareness regarding the cloud and encryption methods isn’t a solution, and companies need to do a lot more if they’re to consistently reduce the threat towards IT. Firms need to devote increasing amounts of time for the identification of threats as a way to minimise fallout risks, especially if they’re to safeguard data for long periods of time.

A blog post by Thales on the subject of the report explained that awareness opens the door towards the issues surrounding confidential and sensitive data security. Once a piece of data’s location and encryption needs are then known, it’s up to firms to implement strong key management to ensure it remains safe.

About Us

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...