Is Encryption Falling Out Of Favour?

Even the most security-conscious organisations can succumb to a data breach. Consider the Ministry of Defence (MoD)  - one of the most secure organisations in the world, you would hope. Despite its stringent measures, figures reveal that the MoD has lost 1,007 laptops, 462 mobile phones, 265 USB data sticks, and 183 hard disk drives containing sensitive and confidential data since 2019. The sensitivity of this data cannot be understated.

From critical national defence plans to the personal information of high profile undercover national security professionals, the loss of such devices could have catastrophic consequences.

Fortunately for the MoD, a key component of their security strategy has helped mitigate these potential damages – encryption. In today's world, where personal and sensitive information is constantly at risk, encryption has become a key tool in maintaining the security and privacy of data by encoding it to ensure it remains inaccessible to unauthorised users.

Even if there is a data breach, and a system or device is physically stolen, illegally accessed or lost, encryption is able to ensure that data remains protected. 

Encryption Lacking On Peripherals

Yet despite encryption being a vital component in the overall cybersecurity puzzle, there has been a concerning drop in the number of companies employing it as part of their standard security practices. According to research from Apricorn, little more than one in ten organisations encrypt data on all laptops - down from 68% in 2022. Looking at desktop computers (down from 68% to 17%), mobile phones (55% to 13%), USB sticks (54% to 17%) and portable hard drives (57% to 4%), we see a similar story.

An alarming number of organisations appear to have taken a backwards step in the protection of information during sharing, handling, and storage, heightening the risk of data exposure.

Notably, 17% of security leaders responding to the survey cited a lack of encryption as the primary cause of at least one data breach - up 5% versus 2021 - and lost or misplaced devices containing sensitive information resulted in breaches at 18% of firms surveyed.

Greater Visibility Of Data

With encryption being pushed aside, many businesses are now struggling to protect critical data - a trend that urgently needs to be reversed. Fortunately, many enterprises are actively working to implement the necessary changes, leading to a notable increase in the number of security leaders planning to encrypt data as standard which has risen from 12% to 23% on average across all devices.

Interestingly, the rise is particularly prevalent for removable devices. For example, over 42% of organisations now plan to introduce or expand encryption on USB sticks, up from 20% in 2022, and 48% plan to do the same for portable drives, up from 16% in 2022. This intent is promising, but what is needed to turn it into action?

Currently, a major stumbling block for enterprises revolves around the widespread shift to remote working. Among those who have embraced a decentralised workforce, 22% revealed they have no control over where company data is stored, while 14% admitted they lack a clear understanding of which data sets need to be encrypted. 

Bridging this visibility gap and enhancing control over data is absolutely vital if encryption is to be implemented on a company-wide basis. Any lack of oversight in relation to both data and devices significantly heightens the risk of data breaches.

Proactive Prioritisation

The imperative to standardise encryption across the enterprise shouldn't be seen merely as a burden but as an opportunity for advancement. Benefits associated with bridging the encryption gap include the secure sharing of files (20%), safeguarding against lost or stolen devices (18%), and avoiding regulatory penalties (14%).
It's evident that companies recognise the value of taking these strides.

However, with only 12% of organisations presently encrypting data on all laptops and 13% on all mobile phones, more proactive measures are urgently required.

Given the potential repercussions of sensitive data loss or leakage, mere intention is insufficient. Today, companies must proactively prioritise the automatic encryption of all company data as standard across the organisation.

Jon Fielding is Managing Director, EMEA, at Apricorn

Image: Unsplash

You Might Also Read: 

Have We Become Complacent About The ‘Insider Threat’?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

 

 

« OpenTofu's New State File Encryption Is A Boon For IaC Security
Kinsing Malware Attacks Analysed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Pindrop Security

Pindrop Security

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.

GovSky

GovSky

GovSky streamlines CMMC compliance, saving time and significantly reducing cost.