HomeNewsIndia NewsBusinesses Collect More Data than they can Handle: Report

    Businesses Collect More Data than they can Handle: Report

    • 45% of Indian organizations can’t analyze or categorize all the consumer data they store
    • 48% of IT professionals in India believe their organizations are failing to carry out all procedures in line with data protection laws
    • Only 48% of Indian companies know where all of their sensitive data is stored

    With pressure to ensure consumer data is protected mounting, Gemalto released the results of a global study which reveals that two in three companies globally (65%) are unable to analyze all the data they collect and only half (54%) of companies know where all of their sensitive data is stored. Compounding this uncertainty, more than two-thirds of organizations   (68%) admit they don’t carry out all the procedures in line with data protection laws such as GDPR.

    These are just some of the findings of the fifth-annual Data Security Confidence Index, which surveyed 1,050 IT decision makers and 10,500 consumers worldwide. The research found that business’ ability to analyze the data they collect varies worldwide with India (55%) and Australia (47%) best at using the data they collect. In fact, despite nine in 10 (89%) global organizations agreeing that analyzing data effectively gives them a competitive edge, only one in five Benelux (20%) and British (19%) companies are able to do so.

    “If businesses can’t analyze all of the data they collect, they can’t understand the value of it – and that means they won’t know how to apply the appropriate security controls to that data,” says Jason Hart, vice president and CTO for Data Protection at Gemalto. “Whether it’s selling it on the dark web, manipulating it for financial gain or to damage reputations, unsecured data is a goldmine for hackers. You only need to look at the recent hacks on the World Anti-Doping Agency and International Luge Federation to see the damage that can be done. What’s more, data manipulation can take years to discover, and with data informing everything from business strategy to sales and product development, its value and integrity cannot be underestimated.”

    Confidence in securing the breach is low

    When it comes to how data is being secured, the study found that more than half (57%) of IT professionals in India say perimeter security is effective at keeping unauthorized users out of their networks. This is despite the majority of IT professionals (67%) believing unauthorized users can access their corporate networks in India, with Australian companies being the most likely (84%) and the UK the least (46%). However, once the hackers are inside, only 56% of organizations in India are extremely confident that their data would be secure. UK businesses are the most concerned with just 24% prepared to say they’re extremely confident, with Australia the highest (65%).

    Even though there is still faith in how they’re securing their networks, one third (27%) of Indian companies reported that their perimeter security had been breached in the past 12 months. Of those that had suffered a breach at some point, only 6% of that compromised data was protected by encryption, leaving the rest exposed.

    Consumers say compliance is critical

    According to the study, a growing awareness of data breaches and communications around GDPR have led to the majority (90%) of consumers believing that it is important for organizations to comply with data regulations. In fact, only 43% are aware what encryption is, showing an understanding of how their data should be protected.

    Hart continues, “It’s time organizations got their houses in order; starting with who oversees their data security. A central figure such as a Data Protection Officer – essential in some circumstances under GDPR – must be appointed to the board to lead data security from the top down. Next is having more insight and analysis on the data collected to ensure that it is both correctly protected and enabling more informed business decision making. Finally, a mindset change. Organizations must realize that it’s no longer a case of if, but when a breach occurs, and protect their most valuable asset – data – through encryption, two-factor authentication and key management, rather than solely focusing on perimeter protection.”

    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.ai
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here

    Related News

    Must Read

    Reinforcement Learning Definition, Types, Examples and Applications

    Reinforcement Learning (RL), unlike other machine learning (ML) paradigms,...

    Infineon drives industry transition to Post-Quantum Cryptography on PSOC Control microcontrollers

    Infineon Technologies AG announced that its microcontrollers (MCUs) in...

    Decision Tree Learning Definition, Types, Examples and Applications

    Decision Tree Learning is a type of supervised machine...

    Renesas Introduces Ultra-Low-Power RL78/L23 MCUs for Next-Generation Smart Home Appliances

    Ultra-low-power RL78/L23 MCUs with segment LCD displays & capacitive...

    STMicroelectronics Appoints MD India

    Anand Kumar is the Managing Director of STMicroelectronics (ST),...

    Top 10 Federated Learning Applications and Use Cases

    Nowadays, individuals own an increasing number of devices—such as...

    Top 10 Federated Learning Companies in India

    Federated learning is transforming AI’s potential in India by...

    Top 10 Federated Learning Algorithms

    Federated Learning (FL) has been termed a revolutionary manner...