{"id":1865,"date":"2006-04-20T00:00:00","date_gmt":"2006-04-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/20\/better-security-wanted-for-confidential-data\/"},"modified":"2021-12-30T11:40:10","modified_gmt":"2021-12-30T11:40:10","slug":"better-security-wanted-for-confidential-data","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/20\/better-security-wanted-for-confidential-data\/","title":{"rendered":"Better security wanted for confidential data"},"content":{"rendered":"<p>A research report by IT analysts Enterprise Strategy Group (ESG) has revealed that data protection practices in businesses need improving.  In this light the overall tendency for businesses to increase their IT and security budgets looks positive.  However, less than a quarter of respondents (23%) believed that current security technologies available to them can fully enforce the required security policies.  Overall, a quarter of respondents believe that their business was &#8220;vulnerable&#8221; or &#8220;very vulnerable&#8221; to a data breach from different attack vectors.  The same percentage of people also claimed that security policies and procedures in their organisation were &#8220;fair&#8221; at most, meaning that a lot of confidential data remained unprotected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interestingly, another study conducted in Britain by YouGov shows that the higher echelons of management in British companies have extremely low expectations regarding computer security.<\/p>\n<p>http:\/\/www.viruslist.com\/en\/news?id=184623070<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1865","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1865"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1865\/revisions"}],"predecessor-version":[{"id":4352,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1865\/revisions\/4352"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}