View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
July 29, 2013

Majority of employees believe Government snoops on their cloud data

Most IT professionals believed this even before the PRISM news hit the headlines.

By Duncan Macrae

Voltage Security, data-centric security providers, have released the results of an industry survey in which 62% of senior-level IT and security respondents said they think the Government snoops on their corporate data, without their knowledge, while it resides in the cloud.

More than half of respondents in the survey work for large enterprise organisations employing more than 5,000 people, representing financial services, retail, healthcare and insurance industries. These results indicate the critical need to protect sensitive information from exposure, regardless of whether the exposure is caused by a malicious act, an inadvertent slip, a surveillance operation or a failure of protective controls or processes.

Dave Anderson, Voltage senior director, commented: "Any sensitive information, including financials, customer and employee data or intellectual property needs to be protected across the entire lifecycle of that data. Any loss or exposure of that data can result in compliance or regulatory fines, loss of brand and reputation and, as the recent NSA events further validate, a loss of privacy around how we communicate and the content of those communications.

An organisation’s data protection strategy must include proactive data protection controls, which enables the ability to supervise and manage how underlying data levels are secured through encryption, tokenisation and data masking, as well as how secured data can be used across the organisation while still ensuring compliance. The focus on securing sensitive data, while maintaining regulatory compliance, is becoming even stronger as a result of the surveillance activities over the last few weeks.

People are growing stronger in their beliefs that security, privacy and compliance are not just a tactical, ‘check the box’ activity that they have to do, but rather is a strategic process that adds tremendous value in their ability to securely communicate at all levels.

"Supervisory data protection controls can deliver and maintain compliance with sanctioned government regulations, and avoid any unnecessary ad-hoc snooping and surveillance activities," said Anderson.

Privacy and security can be effectively balanced with regulatory compliance as part of a comprehensive data protection programme. The ability to ‘de-identify’ information, either through encryption, tokenization or data masking capabilities, provide very effective mechanisms to secure sensitive data, how that data is communicated, used and managed.

Content from our partners
Rethinking cloud: challenging assumptions, learning lessons
DTX Manchester welcomes leading tech talent from across the region and beyond
The hidden complexities of deploying AI in your business

This strategy inherently provides an underlying foundation for data privacy as well, ensuring that not just the data level itself is secure, but also that the information can only be accessed and used by authorised users and the specific intended recipients. In this case, privacy and security become much aligned and users and organisations now have the ability to secure any sensitive data, while ensuring communications and use of that data can remain private.

As more organisations leverage the cloud for data processing and analytics, security and privacy become the core requirement across these initiatives. The only way to provide the necessary levels of security to guard against data loss, either through surveillance, a malicious attack, or an inadvertent disclosure, is through a data-centric security program.

Anderson added: "We believe that this approach, which can protect sensitive data across the entire data lifecycle, can allow companies to leverage the benefits of cloud adoption, and ensure their sensitive data is protected from any prying eyes. This approach can completely change the negative view of 62% of companies regarding the security of their data in the cloud."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.