IT Policy Compliance Group has released a report showing 68 percent of companies lose sensitive data each year and have sensitive data stolen six times a year. Sadly, twenty percent of those companies lose sensitive data... (are you ready for this?) - twenty-two times OR MORE per year.
Hmmm. To quote the Captain in Cool Hand Luke, "What we have here is, a failure to communicate."
Apparently, quite a few organizations do not look at data protection as an essential business practice.
The first part of a solution for data protection is the technology. Anyone who has worked on their car or had to perform some handy work around the house knows that having the right tool makes all of the difference. Data security is no different.
The second part to the technology is the resources. Without people to confirm that the technology is implemented properly, the solution is incomplete. Assessments and processes are what separate the chaff from the wheat in the world of data security.
What about your company? Where is your organization at in the encryption adoption process?
The right people will recommend the right actions and the right technology to protect your company from the wrong people.
Make sure that your organization does the right thing and finds a good combination of the two.
Just a side note: Folks, if you buy the software, get it installed. If you are panicky and in a hurry before you bought the software, then stay focused until it actually gets installed. I've seen some organizations that will push to purchase the technology like their house is on fire (which is an appropriate analogy) and then once the PO is completed, the deployment is shuffled to the back of the deployment queue. Sorry, but all IT needs are not equal and you have to treat the deployment of a data security technology with the same sense of urgency that you purchased the product.