A new report found that data protection safeguards are not at the level they should be for many businesses.

New report highlights lack of data protection in the workplace

Stephen Perkins

While cloud-based data storage has made significant strides, there are still grave security concerns regarding data protection.

Inadequate data protection
Even though cloud storage has been adopted by a growing number of businesses, the majority of them don't take extra security precautions other than what's provided by the storage provider, according to a Science​ Daily article that cited the Georgia Tech Emerging Cyber Threats Report for 2014.

The report was conducted by the Georgia Tech Information Security Center and Georgia Tech Research Institute and was released at the annual Georgia Tech Cyber Security Summit.

The summit hosted prominent industry and academic leaders in the cybersecurity field, which focused on cloud security in the wake of a massive data collection program under the guise of the federal government.

Specifically, encryption was the main topic of discussion among the cybersecurity cohorts. Data protection in the cloud has become a priority, but additional safeguards and encryption measures impede data accessibility and processing speed, noted GTISC director Wenke Lee, according to the source. The effects of encryption are likely to spur a growing debate over the tradeoffs between functionality, security and efficiency.

Concerns grow over the Internet of Things
Additional findings noted the rising security implications associated with the Internet of Things, and the very real possibility of Internet-connected devices in major industries becoming targets of hackers and sources of data leakage.

The proliferation of Internet-connected devices has created the ability to seize more real-world information, providing an opportunity for external parties to use that data as seen with the National Security Agency's PRISM program.

Even as mobile device makers implement broader data protection barriers, malicious and targeted attacks can still find inroads. Earlier this year, Georgia Tech researchers were able to bypass the Apple App Store's vetting process, demonstrating how compromised USB chargers can be utilized to infect any Apple iOS device.

"No matter how successful we have been, black hat operatives will continue to attack infrastructure at every angle possible, making cybersecurity a global issue for years to come," said Bo Rotoloni, director of GTRI's Cyber Technology and Information Security Laboratory. "We must remain vigilant. The purpose of this summit and report is to raise awareness, create educational opportunities and maintain an ongoing dialogue among industry, academia and government."

With mobile devices and cloud computing becoming the norm for businesses, data protection and secure data storage that have strong encryption methods will be a necessity for defending against continuous and emerging cybersecurity threats.

Categories: Data Protection