security in the new world of content and documents
TRANSCRIPT
Security in the New World of Content and Documents
Ponemon Institute, 2015 Security Breaches Study; Ponemon Institute, 2013 Confidential Documents at Risk Study
Security is a Top Initiative to Protect from External Attacks
Top data security breaches:
• 39% business information
• 27% customer information
• 14% intellectual property
• 10% employee information0% 10% 20% 30% 40% 50%
Cloud Computing
Business Intelligence
Security
Mobility
% of respondents
75%
Number of Companies Reporting a
Data Security Breach
Top Areas of Focus for
IT Professionals in 2015
Security is a Top Initiative to Protect from Internal Risks
Feel that their organization is exposed to considerable risk due to stored content
that is not correctly identified
Of U.S. organizations experienced leakage or loss of sensitive or confidential
documents
AIIM Industry Watch Content Analytics , July 2015; IDC InfoBrief: The Document Disconnect, 2015
54% 90%
.
76%
Say document process issues impact revenue recognition or create
auditor issues
Are Your Document Workflows Creating Risk for Your Company?
• Paper creates risk
• Free conversion sites create risk
• Ad-hoc sharing creates risk
• Lack of visibility and traceability creates risk
Old Paper Habits Die Hard—Or Not at All
58%
Default to printing and signing a
document received via email
27%
Print PDF documents in order to review
them
“The State of Document Productivity in the Workplace.” Nitro, 2014
Old Paper Habits Create Risk
• Paper is at the heart of a significant percentage of security breaches
• Paper is too easy to destroy.
• Paper is impossible to track, version, or protect.
23%
61%
Of major breaches (affecting more than 500 individuals)
involve paper records
61% of small breaches involve paper records
Ponemon Institute, 2013 Confidential Documents at Risk Study
Unvetted PDF Conversion Sites Create Risk
• Are your employees searching for Free PDF Conversion tools and loading their documents onto the internet?
• How much can you trust these sites with your sensitive and confidential company, customer, and employee information?
Vilnius, Lithuania?
Ad-hoc Sharing Creates Risk
Ponemon Institute, 2012 Security Breaches Study
77% do not provide secure document sharing/mobile access
solutions for their employees
85% use insecure file sharing tools such as DropBox, Box.net, USB
drives, email attachments
Public Drives USB Drives Email Attachments
62% 68% 71%
Most Common Methods of Theft or Loss
Lack of Visibility and Traceability Create Risk
IDC InfoBrief: The Document Disconnect, 2015
55%
Can’t tell whether a document has been viewed/reviewed/signed by appropriate people and cite difficulty getting status
and visibility into the process
38%
Cite difficulty relating documents or versions of documents into important
context
Business Leaders See Upside Potentialin Improving Document Security
IDC InfoBrief: The Document Disconnect, 2015
Execs and managers in sales, HR, procurement, legal, and other departments estimate that fixing the ‘document disconnect’ will significantly reduce risk.
23%
Risk Reduction
4 Things You Can Start Doing Today
Provide workers access to the right tools
Eliminate paper wherever possible
Prescribe standardized collaboration practices
Investigate a Smart Documents Platform
Thank you!
Please contact us for further information, or to learn how Nitro can help your organization.
Visit our Website: www.GoNitro.com
Visit our Blog: blog.gonitro.com
Follow us on Twitter: @NitroHQ