Analytics // Security Monitoring
1/9/2014
06:56 AM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

Fearing NSA Surveillance, 25 Percent Of Firms Plan To Move Data Offshore

Scandal over NSA privacy violations causes a quarter of companies to change data hosting locations

One-quarter of businesses are planning to move their data outside of the United States as a result of recent scandals over surveillance by the National Security Agency, according to a study published Wednesday.

The study, commissioned by PEER 1 Hosting, reports that about a third of Canadian companies are planning to move away from U.S. data centers.

Despite the emerging trend, the U.S. remains the most popular place for U.K. and Canadian companies to host data outside of their home countries, with 51 percent planning to keep data in the U.S, the study says.

The survey revealed that the top three concerns for U.K. and Canadian businesses when choosing a hosting provider are now security (96 percent), performance (94 percent), and reputation (87 percent). Nearly 70 percent of respondents agree they would sacrifice performance to ensure data sovereignty.

Yet organizations admit they are struggling to fully understand current data laws. Sixty percent agree they don't know as much as they should about data security laws, and 44 percent feel that privacy and security laws confuse them, the study says.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
hmmm
50%
50%
hmmm,
User Rank: Apprentice
1/9/2014 | 7:03:39 PM
re: Fearing NSA Surveillance, 25 Percent Of Firms Plan To Move Data Offshore
Good thing the NSA doesn't target communications outside of the United States.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0121
Published: 2015-05-30
IBM Rational Requirements Composer 3.0 through 3.0.1.6 and 4.0 through 4.0.7 and Rational DOORS Next Generation (RDNG) 4.0 through 4.0.7 and 5.0 through 5.0.2, when LTPA single sign on is used with WebSphere Application Server, do not terminate a Requirements Management (RM) session upon LTPA token ...

CVE-2015-0191
Published: 2015-05-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0191. Reason: This candidate is a duplicate of CVE-2014-0191. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2014-0191 instead of this candidate. All references and descriptions in this candid...

CVE-2015-0193
Published: 2015-05-30
Cross-site scripting (XSS) vulnerability in IBM Business Process Manager (BPM) 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, and 8.5.x through 8.5.5.0 and WebSphere Lombardi Edition (WLE) 7.2.x through 7.2.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL...

CVE-2015-0733
Published: 2015-05-30
CRLF injection vulnerability in the HTTP Header Handler in Digital Broadband Delivery System in Cisco Headend System Release allows remote attackers to inject arbitrary HTTP headers, and conduct HTTP response splitting attacks or cross-site scripting (XSS) attacks, via a crafted request, aka Bug ID ...

CVE-2015-0743
Published: 2015-05-30
Cisco Headend System Release allows remote attackers to cause a denial of service (DHCP and TFTP outage) via a flood of crafted UDP traffic, aka Bug ID CSCus04097.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?