Is Encryption Falling Out Of Favour?

Even the most security-conscious organisations can succumb to a data breach. Consider the Ministry of Defence (MoD)  - one of the most secure organisations in the world, you would hope. Despite its stringent measures, figures reveal that the MoD has lost 1,007 laptops, 462 mobile phones, 265 USB data sticks, and 183 hard disk drives containing sensitive and confidential data since 2019. The sensitivity of this data cannot be understated.

From critical national defence plans to the personal information of high profile undercover national security professionals, the loss of such devices could have catastrophic consequences.

Fortunately for the MoD, a key component of their security strategy has helped mitigate these potential damages – encryption. In today's world, where personal and sensitive information is constantly at risk, encryption has become a key tool in maintaining the security and privacy of data by encoding it to ensure it remains inaccessible to unauthorised users.

Even if there is a data breach, and a system or device is physically stolen, illegally accessed or lost, encryption is able to ensure that data remains protected. 

Encryption Lacking On Peripherals

Yet despite encryption being a vital component in the overall cybersecurity puzzle, there has been a concerning drop in the number of companies employing it as part of their standard security practices. According to research from Apricorn, little more than one in ten organisations encrypt data on all laptops - down from 68% in 2022. Looking at desktop computers (down from 68% to 17%), mobile phones (55% to 13%), USB sticks (54% to 17%) and portable hard drives (57% to 4%), we see a similar story.

An alarming number of organisations appear to have taken a backwards step in the protection of information during sharing, handling, and storage, heightening the risk of data exposure.

Notably, 17% of security leaders responding to the survey cited a lack of encryption as the primary cause of at least one data breach - up 5% versus 2021 - and lost or misplaced devices containing sensitive information resulted in breaches at 18% of firms surveyed.

Greater Visibility Of Data

With encryption being pushed aside, many businesses are now struggling to protect critical data - a trend that urgently needs to be reversed. Fortunately, many enterprises are actively working to implement the necessary changes, leading to a notable increase in the number of security leaders planning to encrypt data as standard which has risen from 12% to 23% on average across all devices.

Interestingly, the rise is particularly prevalent for removable devices. For example, over 42% of organisations now plan to introduce or expand encryption on USB sticks, up from 20% in 2022, and 48% plan to do the same for portable drives, up from 16% in 2022. This intent is promising, but what is needed to turn it into action?

Currently, a major stumbling block for enterprises revolves around the widespread shift to remote working. Among those who have embraced a decentralised workforce, 22% revealed they have no control over where company data is stored, while 14% admitted they lack a clear understanding of which data sets need to be encrypted. 

Bridging this visibility gap and enhancing control over data is absolutely vital if encryption is to be implemented on a company-wide basis. Any lack of oversight in relation to both data and devices significantly heightens the risk of data breaches.

Proactive Prioritisation

The imperative to standardise encryption across the enterprise shouldn't be seen merely as a burden but as an opportunity for advancement. Benefits associated with bridging the encryption gap include the secure sharing of files (20%), safeguarding against lost or stolen devices (18%), and avoiding regulatory penalties (14%).
It's evident that companies recognise the value of taking these strides.

However, with only 12% of organisations presently encrypting data on all laptops and 13% on all mobile phones, more proactive measures are urgently required.

Given the potential repercussions of sensitive data loss or leakage, mere intention is insufficient. Today, companies must proactively prioritise the automatic encryption of all company data as standard across the organisation.

Jon Fielding is Managing Director, EMEA, at Apricorn

Image: Unsplash

You Might Also Read: 

Have We Become Complacent About The ‘Insider Threat’?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

 

 

« OpenTofu's New State File Encryption Is A Boon For IaC Security
Kinsing Malware Attacks Analysed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

Silicon Cloud International

Silicon Cloud International

Silicon Cloud is a high performance and secure cloud computing platform for engineering and scientific applications.

Ridge Global

Ridge Global

Ridge Global works with C-suite executives and corporate directors to build more resilient organizations through innovative preparedness, protection, response and education capabilities.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

CyberMontana

CyberMontana

CyberMontana is a statewide initiative providing cybersecurity awareness, training, and workforce development for businesses and residents of Montana.

OmniIndex

OmniIndex

OmniIndex PostgresBC is the only commercial solution allowing you to keep your most sensitive and critical data encrypted while analyzing it. Structured and unstructured.