{"id":1920,"date":"2007-08-22T00:00:00","date_gmt":"2007-08-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/08\/22\/off-network-data-is-major-security-threat-for-companies\/"},"modified":"2021-12-30T11:40:17","modified_gmt":"2021-12-30T11:40:17","slug":"off-network-data-is-major-security-threat-for-companies","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/08\/22\/off-network-data-is-major-security-threat-for-companies\/","title":{"rendered":"&#8216;Off-Network Data&#8217; Is Major Security Threat For Companies"},"content":{"rendered":"<p>A new study shows that 73% of companies have had a data loss in the past two years, but they&#8217;ve made only limited efforts to shore up their defenses and their protect data.  According to Ponemon, the study showed that 62% of those surveyed said they are unsure if their off-network equipment contains unprotected sensitive or confidential information, while 39% do not view managing this equipment as a critical security step.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Protecting data that is stored on devices outside the confines and control of the corporate network is a problem for which many companies simply do not have a solution,&#8221; said Larry Ponemon, founder and chairman of the Ponemon Institute, in a statement.<\/p>\n<p>&#8220;Our research shows that, while most companies recognize the risk off-network data poses, few seem to have a grasp on how to manage the many challenges off-network data present to maintaining a strong data security program, and many do not even have a policy to address the situation.&#8221;<\/p>\n<p>http:\/\/www.informationweek.com\/news\/showArticle.jhtml?articleID=201801989<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1920","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1920"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1920\/revisions"}],"predecessor-version":[{"id":4407,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1920\/revisions\/4407"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}