Fleetowner Com Sites Fleetowner com Files Uploads 2014 11 Cybersecurity

New data defenses may be needed

Nov. 6, 2014

Nothing stays static very long in the digital world, especially when it comes to the nefarious activities of hackers and cyber criminals.

So even if you think your electronic network defenses are good and strong today, they could very well be compromised tomorrow, simply because efforts to breach them never cease.

That’s one of the findings from a new report dubbed Defending Data: An Inside Look at How Corporate Security Officials Are Navigating a Constantly Shifting Information Landscape, penned by Ari Kaplan Advisors (AKA) and sponsored by technology firm Nuix (click here to download a copy of it.)

Those worries are especially true in trucking as the successful and safe movement of freight increasingly relies on the transference of accurate and secure data.

Ari Kaplan, the report’s author and principal researcher, noted that companies are now focusing on ways to “balance” data breach prevention with post-breach remediation.

“We also noted increasing collaboration between security specialists and data owners, and a growing tension between enhancing productivity and strengthening security,” he said. “We also found that there is a strong consensus among security professionals and experts that perimeter defense is no longer a sufficient information security strategy.”

Here are some more findings from AKA and Nuix’s report:

  • Nearly three-quarters (73%) of respondents said their cybersecurity needs had changed in the past 12 months and 69% said they expected them to change again in the next year.
  • As a result, 27% of respondents said they formally reassessed their cybersecurity needs quarterly, and a further 31% did so annually.
  • Information security officers and data custodians would need to share responsibility for knowing where different pieces of sensitive information were kept and ensuring that they were stored securely. Such collaboration was a daily event for 23% of survey participants, and at least monthly for 54%.
  • The increasing use of mobile and personal devices to access corporate systems are “expanding” the digital security perimeter beyond what any corporation can control, introducing threats that firms cannot fully monitor, the study found
  • Yet while 96% of respondents said their companies allowed remote access to systems, only 69% had formal “bring your own device” or BYOD policies in place, with the remainder allowing such activity to go unmanaged.

“This report confirms and clarifies what we’ve been hearing in the marketplace, that information security is undergoing a profound change and entering a new phase,” noted Jim Kent, Nuix’s global head of investigations and cybersecurity.

“We’ll be very interested to see how this transformation works its way through the business community as we repeat this benchmarking survey next year and into the future,” he added.

So will the trucking industry, as well, methinks.

About the Author

Sean Kilcarr 1 | Senior Editor

Voice your opinion!

To join the conversation, and become an exclusive member of FleetOwner, create an account today!

Sponsored Recommendations

Downtime is expensive. This guide shows you how to keep your eet running, reduce repair surprises, and protect your margins—because when your trucks aren’t moving, you’re not...
Learn how fast oil changes can optimize vehicle downtime for fleet owners. Improve revenue and employee productivity while ensuring customer satisfaction with efficient maintenance...
Learn how fast oil changes can optimize vehicle downtime for fleet owners. Improve revenue and employee productivity while ensuring customer satisfaction with efficient maintenance...
Unlock proven strategies to streamline operations, lead your team, and keep your eet moving forward – all in one guide.