Intellectual property theft spreading fast

By on
Intellectual property theft spreading fast

Loss of data grabs headlines, but broader IP protection now a priority.

One-third of US enterprises recently surveyed admitted losing sensitive data in the past 12 months, while another 11 percent were 'unsure' whether a breach had occurred.

Research conducted by the Enterprise Strategy Group for information monitoring firm Reconnex noted that intellectual property protection goes beyond securing private records.

Fear of intellectual property theft has become such a priority that 90 percent of companies plan to deploy new technologies to secure their information in the next 12 months.

The "epicentre of risk" continues to be insiders who are negligent or act with malicious intent. Some 58 percent of firms believe that the biggest threat to their data is from malicious or negligent insiders.

While the physical loss of laptops and USB devices, and the data they contain, remains a concern, this represents only a portion of total risk.

The research found that many organisations believe that intellectual property is likely to leak via traffic on the network such as email or the Web.

Ironically, there are still some organisations that do not inspect such obvious and well documented leak points as webmail and instant messages.

The research found that one third of companies' sensitive data and intellectual property exists in application databases where it can be secured and managed centrally.

An additional 28 percent resides in file system. This is contrary to past reports indicating that email is the number one source of confidential data leakage.

About 70 percent of organisations review their data protection policies on a quarterly or monthly basis.

"Intellectual property permeates even the furthest corners of the corporate network," said Eric Ogren, security analyst with the Enterprise Strategy Group.

"Security teams using manual procedures to protect the business against this leakage face a challenge finding cost-effective approaches to discover, classify and protect intellectual property.

"The overwhelming risk of insider abuse, and the expense of manual procedures, screams out for technology administered by an independent security/audit staff."
Copyright ©v3.co.uk
Tags:

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?