The Encryption Gap - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Information Management
Commentary
7/23/2009
10:34 AM
Lorna Garey
Lorna Garey
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

The Encryption Gap

Things that make us say "hmmm" include these stats: The percentage of respondents to our 2009 Strategic Security Survey rating encrytion as effective in reducing risk dropped from 57% in 2008 to 48% in 2009. Use of disk, file and backup media encryption ALL fell year over year by at least five percentage points. Backup encryption usage is down 10 points.

Things that make us say "hmmm" include these stats: The percentage of respondents to our 2009 Strategic Security Survey rating encrytion as effective in reducing risk dropped from 57% in 2008 to 48% in 2009. Use of disk, file and backup media encryption ALL fell year over year by at least five percentage points. Backup encryption usage is down 10 points.What gives? Afraid of losing your keys? Don't want to do recovery testing? FUD over algorithms?

Whatever is holding IT up, we need to get over it. Nevada and Massachusetts are enacting legislation to require encryption of data on remote devices, and there's frankly no reason to think similar laws won't be passed in other states, even on a federal level. Multiple regulations and compliance frameworks embrace encryption as a requirement for data in motion and at rest.

To find out where the disconnect is coming from, and hopefully close the gap a bit, Michael A. Davis is working on an InformationWeek Analytics report that will explain how to use encryption technologies effectively from end to end. But first, we need your help with our comprehensive encryption survey covering the current state of encryption within the enterprise: What assets are, and are not, being encrypted to reduce the risk of exposure? Where sensitive data is going unencrypted, what's holding you back? Our survey also encompasses enterprise key management and database encryption.

This survey will take approximately 5 minutes to complete. Upon completion, you will be eligible to enter a drawing to receive one Apple 16GB iPod touch valued at $299 from TechWeb. Your responses will remain confidential and will only be reported in aggregate.

Thanks in advance.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Commentary
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
News
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll