Intellectual property theft spreading fast

Loss of data grabs headlines, but broader IP protection now a priority.

One-third of US enterprises recently surveyed admitted losing sensitive data in the past 12 months, while another 11 per cent were 'unsure' whether a breach had occurred.

Research conducted by the Enterprise Strategy Group for information monitoring firm Reconnex noted that intellectual property protection goes beyond securing private records.

Fear of intellectual property theft has become such a priority that 90 per cent of companies plan to deploy new technologies to secure their information in the next 12 months.

The "epicentre of risk" continues to be insiders who are negligent or act with malicious intent. Some 58 per cent of firms believe that the biggest threat to their data is from malicious or negligent insiders.

While the physical loss of laptops and USB devices, and the data they contain, remains a concern, this represents only a portion of total risk.

The research found that many organisations believe that intellectual property is likely to leak via traffic on the network such as email or the web.

Ironically, there are still some organisations that do not inspect such obvious and well documented leak points as webmail and instant messages.

The research found that one third of companies' sensitive data and intellectual property exists in application databases where it can be secured and managed centrally.

An additional 28 per cent resides in file system. This is contrary to past reports indicating that email is the number one source of confidential data leakage.

About 70 per cent of organisations review their data protection policies on a quarterly or monthly basis.

"Intellectual property permeates even the furthest corners of the corporate network," said Eric Ogren, security analyst with the Enterprise Strategy Group.

"Security teams using manual procedures to protect the business against this leakage face a challenge finding cost-effective approaches to discover, classify and protect intellectual property.

"The overwhelming risk of insider abuse, and the expense of manual procedures, screams out for technology administered by an independent security/audit staff."

Source: Copyright ©v3.co.uk

See more about:  ip  |  theft
 
 

Latest Comments

Latest Competitions

Experience The Evil Within at an exclusive VIP event! 

Experience The Evil Within at an exclusive VIP event!

10 VIPs will win a place at this exclusive event to get hands on time with Bethesda's upcoming horror title.
Win! Godzilla Prize Packs 

Win! Godzilla Prize Packs

STOMP ALL THE THINGS.
Win! Batman: Assault on Arkham 

Win! Batman: Assault on Arkham

Na na na na na na na WIN STUFF!
Win! Destiny 

Win! Destiny

We're giving away a copy of next great console shooter!
Win! 300 Rise of an Empire 

Win! 300 Rise of an Empire

We're giving away five awesome prize packs!
 

Latest Poll

What PC component are you planning to upgrade in the next six months










Ads by Google

From our Partners

PC & Tech Authority Downloads