50% of CEOs don't know how to handle major data breaches

The Boardroom

by Claire Vanner| 24 February 2014

Enterprises need to identify information governance procedures, says HP.

Half of the CEOs questioned as part of The Economist Intelligence Unit's Information Risk report admitted that they had not been trained in what to do in the event of a major data breach.

The HP-commissioned survey of 300 business leaders worldwide looked to determine what approaches companies are taking to manage the risk of information.

The perceived value of information has never been higher. One-in-three respondents estimate the value of information held by their organization to be between 10% and 50% of total assets.

"Enterprises must identify the appropriate governance procedures to assure that their information and that of their customers is given the appropriate protection. This increases the burden of care on the service provider," Andrzej Kawalec, HP Chief Technologist told CBR.

"With the line between public, personal, sensitive and private data being blurred, the industry desperately needs a clear definition of what is public and what is private. Cloud is no different from outsourcing or shared services."

Just as technology has transformed information into a valuable business asset, outsourcing, cloud computing, social media, bring-your-own device and other technology-enabled business trends have meant that information is increasingly dispersed across the globe. This has increased its appeal and accessibility to competitors and attackers, as well as made it more vulnerable to careless employees.

"For enterprises, it is no longer a case of if they are breached, but when. How enterprises respond in the first minutes and hours following a major incident can be the difference between success and failure," warned Kawalec.

Kawalec has advised businesses to adhere to the following tips to keep minimise their information risk:

Do not panic
Enterprises have been living with these vulnerabilities now for years. In many cases these vulnerabilities rely on a user action - clicking on a link or website - to unlock their potential. Always click carefully.

Close applications when they aren't being used
Cyber criminals and hackers will often use information gathered from a mobile device - contact/social media/location - to build up a profile of an individual and perform more targeted attacks aimed at the employer or corporate systems.

Update software, both the applications and the operating system on mobile devices.
At HP we are constantly working with our partners to close security flaws in their mobile applications, which often prey on old versions of software. Lastly, if in any doubt, users should delay the actions they were going to take on their mobile devices, and wait until they can perform it using a laptop or desktop. The same encryption standards applied across PCs are not yet being applied to mobile devices.

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

755 people like this.
0 people follow this.

The Boardroom Intelligence

Buy the latest industry research online today!
See more

Suppliers Directory

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.