Intelligent CIO Middle East Issue 41 | Page 27

INFOGRAPHIC sensitive data is becoming increasingly complex. Nine out of 10 respondents are using, or will be using, some type of cloud environment and 44% rated complexity of that environment as a perceived barrier to implementing proper data security measures. In fact, this complexity is ahead of staff needs, budget restraints and securing organisational buy-in. Despite increase in data breaches enterprises are still not investing in protection Globally, 60% of organisations say they have been breached at some point in their history, with 30% experiencing a breach within the past year alone. In a year where breaches regularly appear in headlines, the US had the highest number of breaches in the last three years (65%) as well as in the last year (36%). The bottom line is that whatever technologies an organisation deploys to make Digital Transformation happen, the easy and timely access to data puts this data at risk internally and externally. A majority of organisations, 86%, said they felt vulnerable to data threats. Unfortunately, this does not always translate www.intelligentcio.com into security best practices as evidenced by the less than 30% of respondents using encryption as part of their Digital Transformation strategy. Frank Dickson, Research Vice President for security products research at IDC, said: “Our research shows that no organisation is immune from data security threats and, in fact, we found that the most sophisticated organisations are more likely to indicate that they have experienced a data security breach. “This trend is consistent no matter how we define the sophistication of the audience: those who are spending more on IT security, those for whom data security is a larger portion of their security budget or those who are further along in their Digital Transformation journey.” Tina Stewart, Vice President of market strategy at Thales eSecurity, added: “Data security is vitally important. Organisations need to take a fresh look at how they implement a data security and encryption strategy in support of their transition to the cloud and meeting regulatory and compliance mandates.” n INTELLIGENTCIO 27