security in the new world of content and documents

12
Security in the New World of Content and Documents

Upload: nitro-inc

Post on 12-Apr-2017

327 views

Category:

Software


2 download

TRANSCRIPT

Page 1: Security in the New World of Content and Documents

Security in the New World of Content and Documents

Page 2: Security in the New World of Content and Documents

Ponemon Institute, 2015 Security Breaches Study; Ponemon Institute, 2013 Confidential Documents at Risk Study

Security is a Top Initiative to Protect from External Attacks

Top data security breaches:

• 39% business information

• 27% customer information

• 14% intellectual property

• 10% employee information0% 10% 20% 30% 40% 50%

Cloud Computing

Business Intelligence

Security

Mobility

% of respondents

75%

Number of Companies Reporting a

Data Security Breach

Top Areas of Focus for

IT Professionals in 2015

Page 3: Security in the New World of Content and Documents

Security is a Top Initiative to Protect from Internal Risks

Feel that their organization is exposed to considerable risk due to stored content

that is not correctly identified

Of U.S. organizations experienced leakage or loss of sensitive or confidential

documents

AIIM Industry Watch Content Analytics , July 2015; IDC InfoBrief: The Document Disconnect, 2015

54% 90%

.

76%

Say document process issues impact revenue recognition or create

auditor issues

Page 4: Security in the New World of Content and Documents

Are Your Document Workflows Creating Risk for Your Company?

• Paper creates risk

• Free conversion sites create risk

• Ad-hoc sharing creates risk

• Lack of visibility and traceability creates risk

Page 5: Security in the New World of Content and Documents

Old Paper Habits Die Hard—Or Not at All

58%

Default to printing and signing a

document received via email

27%

Print PDF documents in order to review

them

“The State of Document Productivity in the Workplace.” Nitro, 2014

Page 6: Security in the New World of Content and Documents

Old Paper Habits Create Risk

• Paper is at the heart of a significant percentage of security breaches

• Paper is too easy to destroy.

• Paper is impossible to track, version, or protect.

23%

61%

Of major breaches (affecting more than 500 individuals)

involve paper records

61% of small breaches involve paper records

Ponemon Institute, 2013 Confidential Documents at Risk Study

Page 7: Security in the New World of Content and Documents

Unvetted PDF Conversion Sites Create Risk

• Are your employees searching for Free PDF Conversion tools and loading their documents onto the internet?

• How much can you trust these sites with your sensitive and confidential company, customer, and employee information?

Vilnius, Lithuania?

Page 8: Security in the New World of Content and Documents

Ad-hoc Sharing Creates Risk

Ponemon Institute, 2012 Security Breaches Study

77% do not provide secure document sharing/mobile access

solutions for their employees

85% use insecure file sharing tools such as DropBox, Box.net, USB

drives, email attachments

Public Drives USB Drives Email Attachments

62% 68% 71%

Most Common Methods of Theft or Loss

Page 9: Security in the New World of Content and Documents

Lack of Visibility and Traceability Create Risk

IDC InfoBrief: The Document Disconnect, 2015

55%

Can’t tell whether a document has been viewed/reviewed/signed by appropriate people and cite difficulty getting status

and visibility into the process

38%

Cite difficulty relating documents or versions of documents into important

context

Page 10: Security in the New World of Content and Documents

Business Leaders See Upside Potentialin Improving Document Security

IDC InfoBrief: The Document Disconnect, 2015

Execs and managers in sales, HR, procurement, legal, and other departments estimate that fixing the ‘document disconnect’ will significantly reduce risk.

23%

Risk Reduction

Page 11: Security in the New World of Content and Documents

4 Things You Can Start Doing Today

Provide workers access to the right tools

Eliminate paper wherever possible

Prescribe standardized collaboration practices

Investigate a Smart Documents Platform

Page 12: Security in the New World of Content and Documents

Thank you!

Please contact us for further information, or to learn how Nitro can help your organization.

Visit our Website: www.GoNitro.com

Visit our Blog: blog.gonitro.com

Follow us on Twitter: @NitroHQ