cxo voice
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News

Businesses collect more data than they can handle : Gemalto Study

News Desk by News Desk
July 16, 2018
Gemalto

With pressure to ensure consumer data is protected mounting, Gemalto, the world leader in digital security, today released the results of a global study which reveals that two in three companies globally (65%) are unable to analyze all the data they collect and only half (54%) of companies know where all of their sensitive data is stored. Compounding this uncertainty, more than two thirds of organizations   (68%) admit they don’t carry out all the procedures in line with data protection laws such as GDPR.

These are just some of the findings of the fifth-annual Data Security Confidence Index, which surveyed 1,050 IT decision makers and 10,500 consumers worldwide. The research found that business’ ability to analyze the data they collect varies worldwide with India (55%) and Australia (47%) best at using the data they collect. In fact, despite nine in 10 (89%) global organizations agreeing that analyzing data effectively gives them a competitive edge, only one in five Benelux (20%) and British (19%) companies are able to do so.

“If businesses can’t analyze all of the data they collect, they can’t understand the value of it – and that means they won’t know how to apply the appropriate security controls to that data,” says Jason Hart, vice president and CTO for Data Protection at Gemalto. “Whether it’s selling it on the dark web, manipulating it for financial gain or to damage reputations, unsecured data is a goldmine for hackers. You only need to look at the recent hacks on the World Anti-Doping Agency and International Luge Federation to see the damage that can be done. What’s more, data manipulation can take years to discover, and with data informing everything from business strategy to sales and product development, its value and integrity cannot be underestimated.”

Confidence in securing the breach is low

When it comes to how data is being secured, the study found that more than half (57%) of IT professionals in India say perimeter security is effective at keeping unauthorized users out of their networks. This is despite the majority of IT professionals (67%) believing unauthorized users can access their corporate networks in India, with Australian companies being the most likely (84%) and the UK the least (46%). However, once the hackers are inside, only 56% of organizations in India are extremely confident that their data would be secure. UK businesses are the most concerned with just 24% prepared to say they’re extremely confident, with Australia the highest (65%).

Even though there is still faith in how they’re securing their networks, one third (27%) of Indian companies reported that their perimeter security had been breached in the past 12 months. Of those that had suffered a breach at some point, only 6% of that compromised data was protected by encryption, leaving the rest exposed.

ADVERTISEMENT

 Consumers say compliance is critical

According to the study, a growing awareness of data breaches and communications around GDPR have led to the majority (90%) of consumers believing that it is important for organizations to comply with data regulations. In fact, only 43% are aware what encryption is, showing an understanding of how their data should be protected.

 Hart continues, “It’s time organizations got their houses in order; starting with who oversees their data security. A central figure such as a Data Protection Officer – essential in some circumstances under GDPR – must be appointed to the board to lead data security from the top down. Next is having more insight and analysis on the data collected to ensure that it is both correctly protected and enabling more informed business decision making. Finally, a mindset change. Organizations must realize that it’s no longer a case of if, but when a breach occurs, and protect their most valuable asset – data – through encryption, two-factor authentication and key management, rather than solely focusing on perimeter protection.”

Additional Resources

  • Visit the Data Security Confidence Index website for the full report, infographic and regional data
  • For more information on Gemalto’s Data Security solutions, click here.

 

News Desk

News Desk

by CXO VOICE team memebrs, [email protected]

Related Posts

MENA cybersecurity spending
Cyber Security

MENA Cybersecurity Spending to Surpass $4 Billion by 2026

October 6, 2025
Airtel railway security
Business

Airtel Business Secures Long-term Contract to Enhance Cybersecurity for Indian Railways

October 6, 2025
Shaheen Sayed Accenture
People

Accenture Appoints Shaheen Sayed as Chief Commercial Officer for Reinvention Services

October 5, 2025
SolarWinds Expands Global Presence With New Office in Bengaluru
Press Release

SolarWinds Expands Global Presence With New Office in Bengaluru

October 3, 2025
IBM and AMD Zyphra
Technology

IBM and AMD Power Zyphra’s AI Revolution

October 2, 2025
Sophos Advisory Services
Cyber Security

Sophos Launches Advisory Services to Deliver Proactive Cybersecurity Resilience

October 2, 2025
Fujitsu at CEATEC 2025
News

Fujitsu to Unveil AI technologies for human augmentation at CEATEC 2025

October 1, 2025
Tech Mahindra and Canal Insurance
Business

Tech Mahindra and Canal Insurance Form Partnership to Boost Digital Changes in P&C Commercial Auto Insurance

September 30, 2025
Load More
ADVERTISEMENT

Latest Updates

MENA cybersecurity spending

MENA Cybersecurity Spending to Surpass $4 Billion by 2026

by Arshi Khan
6 hours ago

Airtel railway security

Airtel Business Secures Long-term Contract to Enhance Cybersecurity for Indian Railways

by Deepa Sharma
10 hours ago

Shaheen Sayed Accenture

Accenture Appoints Shaheen Sayed as Chief Commercial Officer for Reinvention Services

by Deepa Sharma
1 day ago

SolarWinds Expands Global Presence With New Office in Bengaluru

SolarWinds Expands Global Presence With New Office in Bengaluru

by News Desk
3 days ago

IBM and AMD Zyphra

IBM and AMD Power Zyphra’s AI Revolution

by Arshi Khan
4 days ago

Jagat Shah, Chairman & CEO of MITSUMI Group

Leadership in Emerging Markets: Exclusive Interview with Jagat Shah, Chairman & CEO of MITSUMI Distribution

by Deepa Sharma
4 days ago

Expert Views

AI in Hiring
Opinion

AI in Hiring: Separating the Hype from Real-World Use Cases

September 19, 2025
Why Even One Unpatched Device Can Be a Catastrophic Risk for Startups and SMBs
Cyber Security

Why Even One Unpatched Device Can Be a Catastrophic Risk for Startups and SMBs

July 25, 2025
Cyber Criminals
Cyber Security

How WormGPT Became ChatGPT’s Evil Twin

July 15, 2025
When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms
Opinion

When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms

May 20, 2025
Molly Sands AI
AI

AI RIP: 5 Things Knowledge Workers Will Say ‘Sayonara’ to in the Next Decade

March 8, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

Jagat Shah, Chairman & CEO of MITSUMI Group
Leaders Talk

Leadership in Emerging Markets: Exclusive Interview with Jagat Shah, Chairman & CEO of MITSUMI Distribution

-
Tokenization
Interview

Revolutionizing Finance: An Exclusive Interview with Sid Ugrankar, Co-founder of Qila.io on the Future of Blockchain and Tokenization

-
Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-
Interview on Counterfeit products with Nikhil Narayan
Leaders Talk

Advancements in ML & AI made it possible to detect counterfeit products in real-time, says Nikhil Narayan

-

Entrepreneur

Top Leadership Skills Entrepreneurs Need in the Age of AI

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release

Copyright © 2025 CXOVoice - All Right Reserved