{"id":885,"date":"2009-01-15T00:00:00","date_gmt":"2009-01-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/01\/15\/encryption-told-to-stop-ignoring-encryption\/"},"modified":"2021-12-30T11:38:19","modified_gmt":"2021-12-30T11:38:19","slug":"encryption-told-to-stop-ignoring-encryption","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/01\/15\/encryption-told-to-stop-ignoring-encryption\/","title":{"rendered":"Encryption told to stop ignoring encryption"},"content":{"rendered":"<p>Brocade is warning companies to reassess their security priorities for data centres and stop ignoring encryption, after a survey found that half of respondents had experienced security breaches during 2008.  The Brocade commissioned survey of 4,500 senior European IT decision-makers in the UK, France and Germany was carried out during late 2008, across a number of verticals (public sector, health, finance, retail, manufacturing\/logistics, telco, media etc).  Four out of five agreed that data security is one of the biggest challenges facing their organisation, after 50 percent of respondents admitted experiencing data loss\/theft in 2008.  Last week, a report from the Identity Theft Resource Center (ITRC) also said that there had been a sharp rise in the number of reported data breaches in 2008.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>But Brocade also recognises that encryption by itself is not enough.  &#8220;Of course encryption is one of many security options, but reports from Gartner and others have suggested that encryption is the biggest issue,&#8221; said Murphy.  &#8220;We believe that the combination of the removal of the performance hit, and the removal of disruptive hit, will make it easier for businesses to choose, especially for companies having to comply with new rules&#8230;We are seeing more and more opportunities at the moment.&#8221;<\/p>\n<p>Murphy also feels that another reason why companies have been hesitant going down the encryption road is in balancing the risk, in that there is no tangible ROI to show the Financial Director when deploying encryption as it is often compared to having an insurance policy (you only realise ROI when you claim).  &#8220;It is almost like an inverted equation,&#8221; Murphy said.  &#8220;So it has been a tough sell for the IT manager.&#8221;<\/p>\n<p>97 percent of respondents considered their data to be very secure or secure.<\/p>\n<p>http:\/\/www.techworld.com\/news\/index.cfm?newsid=109511&#038;pagtype=all<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-885","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=885"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/885\/revisions"}],"predecessor-version":[{"id":3372,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/885\/revisions\/3372"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}