Is Encryption Falling Out Of Favour?

Even the most security-conscious organisations can succumb to a data breach. Consider the Ministry of Defence (MoD)  - one of the most secure organisations in the world, you would hope. Despite its stringent measures, figures reveal that the MoD has lost 1,007 laptops, 462 mobile phones, 265 USB data sticks, and 183 hard disk drives containing sensitive and confidential data since 2019. The sensitivity of this data cannot be understated.

From critical national defence plans to the personal information of high profile undercover national security professionals, the loss of such devices could have catastrophic consequences.

Fortunately for the MoD, a key component of their security strategy has helped mitigate these potential damages – encryption. In today's world, where personal and sensitive information is constantly at risk, encryption has become a key tool in maintaining the security and privacy of data by encoding it to ensure it remains inaccessible to unauthorised users.

Even if there is a data breach, and a system or device is physically stolen, illegally accessed or lost, encryption is able to ensure that data remains protected. 

Encryption Lacking On Peripherals

Yet despite encryption being a vital component in the overall cybersecurity puzzle, there has been a concerning drop in the number of companies employing it as part of their standard security practices. According to research from Apricorn, little more than one in ten organisations encrypt data on all laptops - down from 68% in 2022. Looking at desktop computers (down from 68% to 17%), mobile phones (55% to 13%), USB sticks (54% to 17%) and portable hard drives (57% to 4%), we see a similar story.

An alarming number of organisations appear to have taken a backwards step in the protection of information during sharing, handling, and storage, heightening the risk of data exposure.

Notably, 17% of security leaders responding to the survey cited a lack of encryption as the primary cause of at least one data breach - up 5% versus 2021 - and lost or misplaced devices containing sensitive information resulted in breaches at 18% of firms surveyed.

Greater Visibility Of Data

With encryption being pushed aside, many businesses are now struggling to protect critical data - a trend that urgently needs to be reversed. Fortunately, many enterprises are actively working to implement the necessary changes, leading to a notable increase in the number of security leaders planning to encrypt data as standard which has risen from 12% to 23% on average across all devices.

Interestingly, the rise is particularly prevalent for removable devices. For example, over 42% of organisations now plan to introduce or expand encryption on USB sticks, up from 20% in 2022, and 48% plan to do the same for portable drives, up from 16% in 2022. This intent is promising, but what is needed to turn it into action?

Currently, a major stumbling block for enterprises revolves around the widespread shift to remote working. Among those who have embraced a decentralised workforce, 22% revealed they have no control over where company data is stored, while 14% admitted they lack a clear understanding of which data sets need to be encrypted. 

Bridging this visibility gap and enhancing control over data is absolutely vital if encryption is to be implemented on a company-wide basis. Any lack of oversight in relation to both data and devices significantly heightens the risk of data breaches.

Proactive Prioritisation

The imperative to standardise encryption across the enterprise shouldn't be seen merely as a burden but as an opportunity for advancement. Benefits associated with bridging the encryption gap include the secure sharing of files (20%), safeguarding against lost or stolen devices (18%), and avoiding regulatory penalties (14%).
It's evident that companies recognise the value of taking these strides.

However, with only 12% of organisations presently encrypting data on all laptops and 13% on all mobile phones, more proactive measures are urgently required.

Given the potential repercussions of sensitive data loss or leakage, mere intention is insufficient. Today, companies must proactively prioritise the automatic encryption of all company data as standard across the organisation.

Jon Fielding is Managing Director, EMEA, at Apricorn

Image: Unsplash

You Might Also Read: 

Have We Become Complacent About The ‘Insider Threat’?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

 

 

« OpenTofu's New State File Encryption Is A Boon For IaC Security
Kinsing Malware Attacks Analysed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

InfoGuard

InfoGuard

InfoGuard is a leading Swiss company providing comprehensive cyber security and network solutions.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).