In this day and age, it seems like a major data breach hits the news nearly every week. Attacks are becoming more sophisticated, hackers are becoming stealthier, and the impacts of these attacks are more widespread. Cybersecurity is a major concern that affects every organization, and especially those containing sensitive data like government agencies. In fact, a recent survey from TechAmerica found that cybersecurity is the number one priority for Federal CIOs and CISOs, even above cloud computing and transforming IT operations.
At the same time, however, employees increasingly demand more functionality from their mobile devices and IT systems. EMC’s recent Privacy Index study found that 91% of respondents value the benefit of “easier access to information and knowledge” that digital technology affords, and 27% say they are willing to trade some privacy for greater convenience and ease online. In a world of constant connectivity, we expect our technology to “just work,” whether we’re sitting in our office or at the gate of an airport. And the growth of mobile has meant that government employees can now work from nearly anywhere at any time, making productivity easier than ever. The problem: Security does not always correlate with productivity.
So how do we find the sweet spot where security meets functionality? Last year EMC commissioned Vanson Bourne to do a study on the Global IT Trust Curve that assessed 3,200 global respondents equally split between Business (1,600) and IT (1,600) leaders, including public sector. The results suggest that “Low decision maker confidence in IT can be related to lack of Trust Maturity,…and that 55% of respondents believe their senior executives are confident that they have adequate data protection, security, and availability…” to meet the current mission needs.
At EMC we view Trust as a co-equal balance of enterprise data protection capabilities: Integrated Backup and Recovery, Information Security/Cyber and Continuous Availability (comprehensive disaster recovery/continuity of operations capabilities).
My colleague, Vic Bhagat, recently wrote about this topic on EMC’s Reflections blog, where he notes that organizations can still be productive without compromising employee security or privacy. Where is your organization on the Trust maturity curve? If you don’t know, or would like to learn more, I invite you to check it out and learn more about how EMC is helping customers navigate this issue in today’s changing landscape.