Feeds

Survey: UK biz is using more encryption

But users still shove unprotected USB sticks in holes...

Intelligent flash storage arrays

Despite a run of high-profile security breaches, almost half of UK corporate laptops remain unprotected against theft and data loss, according to a survey of British businesses published on Thursday.

Only 52 per cent of 320 UK public and private sector IT managers polled in the survey use data encryption on their corporate laptops. Half (50 per cent) fail to protect removable media (USB sticks and DVDs).

The study, commissioned by corporate network and device security firm Check Point, showed that data encryption usage on UK business laptops has grown significantly in the past year. Laptop encryption up 12 points from 40 per cent last year to 52 per cent this year. Consumerisation of IT, the trend where workers use their own smartphones or computers at work as an alternative to using more staid corporate-supplied kit, emerged as a key concern among survey participants.

Only 17 per cent of the organisations quizzed said they insisted on deploying security on personal devices used for work purposes. A further 42 per cent restrict access to corporate networks to corporate devices only. Many of those quizzed (42 per cent) worked for organisations with no security policy in the area.

A substantial minority (13 per cent) of those quizzed reported a breach due to a lost or stolen laptop and a further 7 per cent reported a lost or stolen USB stick or removable storage device. Around one in 12 (8 per cent) reported a breach from an email being accidentally sent to the wrong recipients. Only a third (32 per cent) of those quizzed used data-leak prevention, a type of security technology sold by Check Point and other vendors as a means to prevent just this type of rogue email mishap.

A laptop encryption growth rate of 12 points over just a year sounds like great progress to us, suggesting that deployment of the long-established technology has stepped up a gear. Check Point's UK boss still isn't satisfied with these results however, describing the rate of growth as "slow".

Terry Greer-King, Check Point’s UK managing director said: "It’s encouraging that more UK firms are protecting their laptops and data, but the rate of growth is slow, and nearly half of organisations still do not secure their data on portable computers and devices. At the same time, new threats such as consumerisation are emerging, and many organisations haven’t established measures to secure the use of personal laptops and smartphones in the workplace."

"These threats need to be addressed by a combination of education and technology so that organisations can protect their data, their business and their employees against the risks of security breaches,” he concluded. ®

Internet Security Threat Report 2014

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.