614-322-2222 or 877-770-8324

Mar

13

Is it IT’s job to convince their execs to prioritize data security?

Is it IT’s job to convince their execs to prioritize data security?

A recent blog post in Tech Republic cites an enlightening Ponemon Institute report about the effectiveness of security metrics. As it turns out, great security metrics typically don’t drive companies to enhance security. Why?

It’s no surprise that IT people either feel their C-suite executives can’t understand their technical information, or that the execs don’t want to listen and they allow other issues to take priority. While security metrics have been improving by leaps and bounds, the ability to communicate the urgency of such information by IT professionals has not. That chasm has led to the reluctance of upper management to spend corporate resources on data security.

Security metrics and plain English

The upshot of the Ponemon Institute report is that great security metrics don’t matter if IT professionals can’t turn them into a case for improved security. That means using more than numbers: It means case studies, recent news reports, and even quantifying the public relations cost of an embarrassing data breach. Shortly after security metrics became popular and IT departments could produce reports showing security goals and progress toward them, data breaches decreased. But then they began to creep up again, according to the report. Experts hypothesize initial excitement wore off and required spending failed to follow recommendations because data security is a less exciting topic than branding or product evolution. Would it be nice if the CEO were just as interested in the security metrics report as in the latest sales figures? Sure. But it’s the job of IT to make a compelling case for executives to pay attention.

Problems and Solutions

A great tactic is to present case studies of data breaches at comparable companies, estimate or cite the cost of those security breaches, and propose real solutions. A great solution to the problem of loose media containing confidential data is onsite data destruction. Onsite data destruction means hard drives, flash drives, disks, smart phones and backup drives never leave protected areas of your IT department until they are wiped clean. It’s a cost-effective solution that helps your company comply with federal regulations surrounding data privacy, such as HIPAA, Gramm Leach Bliley, and Sarbanes-Oxley. And that is music to a CEO’s ears.

To learn more about onsite data destruction, check out TechR2’s Tear-A-Byte® solution.

Contact us today to see how TechR2 can assist you with your next project.



  • Providing complete “Cradle to Grave” data eradication solutions, sound experience, industry best practices and resources to support you.


    Why risk it? Get started today! Call 614-322-2222



  • About An Industry Leader

    TechR2 is the only company in the industry that has earned a US patent for its Track-Contain-Destroy-Verify data security process, is OEM approved, upholds critical ISO certifications, and is recognized for compliance with GDPR, NIST and all governmental regulations concerning data destruction, including ISO 27001, ISO 14001, ISO 9001, and ISO 45001.