Is it IT’s job to convince their execs to prioritize data security?

About Data Security,Asset Disposal,TechR2 Blog

Is it IT’s job to convince their execs to prioritize data security?

[vc_row][vc_column width=”1/4″][vc_column_text]A recent blog post in Tech Republic cites an enlightening Ponemon Institute report about the effectiveness of security metrics. As it turns out, great security metrics typically don’t drive companies to enhance security. Why?

It’s no surprise that IT people either feel their C-suite executives can’t understand their technical information, or that the execs don’t want to listen and they allow other issues to take priority. While security metrics have been improving by leaps and bounds, the ability to communicate the urgency of such information by IT professionals has not. That chasm has led to the reluctance of upper management to spend corporate resources on data security.[/vc_column_text][/vc_column][vc_column width=”1/4″][vc_column_text]

Security metrics and plain English

The upshot of the Ponemon Institute report is that great security metrics don’t matter if IT professionals can’t turn them into a case for improved security. That means using more than numbers: It means case studies, recent news reports, and even quantifying the public relations cost of an embarrassing data breach. Shortly after security metrics became popular and IT departments could produce reports showing security goals and progress toward them, data breaches decreased. But then they began to creep up again, according to the report. Experts hypothesize initial excitement wore off and required spending failed to follow recommendations because data security is a less exciting topic than branding or product evolution. Would it be nice if the CEO were just as interested in the security metrics report as in the latest sales figures? Sure. But it’s the job of IT to make a compelling case for executives to pay attention.[/vc_column_text][/vc_column][vc_column width=”1/4″][vc_column_text]

Problems and Solutions

A great tactic is to present case studies of data breaches at comparable companies, estimate or cite the cost of those security breaches, and propose real solutions. A great solution to the problem of loose media containing confidential data is onsite data destruction. Onsite data destruction means hard drives, flash drives, disks, smart phones and backup drives never leave protected areas of your IT department until they are wiped clean. It’s a cost-effective solution that helps your company comply with federal regulations surrounding data privacy, such as HIPAA, Gramm Leach Bliley, and Sarbanes-Oxley. And that is music to a CEO’s ears.[/vc_column_text][/vc_column][vc_column width=”1/4″][vc_column_text]To learn more about onsite data destruction, check out TechR2’s Tear-A-Byte® solution.

[/vc_column_text][vc_column_text]Contact us today to see how TechR2 can assist you with your next project.[/vc_column_text][/vc_column][/vc_row]

[vc_row type=”grid” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

Tags :
business of security,compliance,data destruction,data security,datacenter decomissioning,Gramm Leach Bliley,HIPAA,information security,ISO 27001,ISO certificate,IT asset disposition,it asset management,risk management strategies,security breach,security lapse
Share This :

Recent Posts