AUSTIN and LONDON -- November 19, 2019—New research launched today by Blancco Technology Group (LON: BLTG), the industry standard in data erasure and mobile device diagnostics, outlines the current misconceptions that prompt so many decision makers to mistakenly choose inadequate data sanitization methods and put their organizations at risk. Blancco’s study, A False Sense of Security, produced in partnership with Coleman Parks, highlights how global enterprises’ overconfidence is exposing the organizations to the risk of data breach, at a time when proper data management should be at the forefront of everything they do. Three quarters (73 percent) agreed that the large volume of different devices at end-of-life leaves their company vulnerable to a data security breach, while 68 percent said they were very concerned about the risk of data breach related to end-of-life equipment.
This survey of 1,850 senior leaders from the world’s largest enterprises in APAC, Europe and North America reveals that more than one in three organizations take considerable risks with the way they sanitize data at end-of-life. These risks include:
· Using inappropriate data removal methods – 36 percent reported using data wiping methods such as formatting, overwriting using free software tools or paid software-based tools without certification or physical destruction (both degaussing and shredding) with no audit trail. These methods are not fully secure and can leave businesses open to potential security and compliance issues. But what’s of particular concern is that 4 percent of these enterprises are not sanitizing data at all, leaving them wide open to attacks.
· Keeping large stockpiles of out-of-use equipment within the company and not dealing with them within a suitable time frame – 80 percent of enterprises admitted having a stockpile of out-of-use equipment sitting in storage and 57 percent reported taking longer than two weeks to erase devices, adding to the risks of potential internal data breaches and lost data.
· Failing to maintain a clear chain of custody with an appropriate audit trail for end-of-life assets, including during transportation to an offsite destruction facility – 17 percent of enterprises report not having an audit trail for the physical destruction process, and 31 percent admitted not capturing the drive serial number. This lack of chain of custody controls means these enterprises are running the risk of data breaches and non-compliance.
The research also reveals that 17 percent of global enterprises use physical shredding or degaussing for end-of-life devices, even though shredding does not always provide a true, certified audit trail that spans the full chain of custody lifecycle.
“Global enterprises are clearly concerned about data when devices reach end-of-life; however, despite knowing the risks involved, many still choose to use an inadequate approach to protect their organization,” said Fredrik Forslund, Vice President, Enterprise and Cloud Erasure Solutions at Blancco. “This points to a huge and worrying knowledge gap within the sector and among senior leaders about the security and compliance implications of physical destruction and end-of-life equipment lying around.”
Other key global findings include:
· A fifth (20 percent) of global enterprises (33 percent in U.S./Canada and the U.K.) do not have a different process for dealing with SSD drives compared to HDD drives and are running the risk of not having all the data appropriately sanitized and being in non-compliance with industry standards.
· The enterprises surveyed also reported that 18 percent of their devices are left somewhere within the company with no action. This highlights a huge security issue and one that should be dealt with immediately.
Key North America findings include:
· Enterprises in North America are using different data removal methods to remove data from their end-of-life devices. Fifteen percent are physically destroying devices (both degaussing and shredding), 13 percent are using formatting, 13 percent are using overwriting using free software tools, 10 percent are using cryptographic erasure/encryption and 8 percent are using overwriting using paid software-based tools without certification.
· Seventy-five percent of U.S. and Canadian respondents reported having end-of-life devices stockpiled in their storage. They also admitted leaving them unused for some time. Almost half (44 percent) of companies in North America wait more than two weeks before erasing end-of-life equipment.
· A majority (65 percent) of U.S. and Canadian respondents raised concerns about the risk of a data breach with end-of-life equipment, and 70 percent agreed that the number of different devices at end-of-life leaves them vulnerable to a data security breach. Nevertheless, 77 percent still have full confidence in the secure erasure for data sanitization within their organization.
Key UK findings include:
· Many U.K. enterprises reported using a variety of data removal methods. A fifth (22 percent) use formatting, 15 percent use cryptographic erasure/encryption, 11 percent use physical destruction (both degaussing and shredding), 6 percent use overwriting using free software tools and 5 percent use overwriting using paid software-based tools without certification. But what’s the most alarming is that 9 percent have no method to wipe data.
· Worryingly, 85 percent of U.K. enterprises also confessed having a stockpile of out-of-use equipment sitting in storage. In addition, enterprises are leaving devices unused for some time. Only 16 percent of U.K. companies said they are erasing end-of-life equipment immediately while 35 percent wait more than two weeks to erase devices, adding to the risks of data breaches and lost data.
· When asked about their security concerns over end-of-life equipment, 52 percent agreed that the plethora of different devices at end-of-life leaves them vulnerable to a data security breach while 57 percent were very concerned about the risk of a data breach with end-of-life equipment, the lowest percentage points from all the countries surveyed.
For full analysis, read the full A False Sense of Security report here: www.blancco.com/false-security
— ENDS —
The primary research was commissioned by Blancco Technology Group and conducted by Coleman Parkes in August 2019. The sample was comprised of 1,850 senior decision makers including Heads of Compliance, CFOs, Financial Directors, ITAMs, CISOs, IT Security VPs, Data Protection Officers and Heads of Operations, from 1,850 organizations with 5,000+ employees. The sample was divided between the U.K., the United States, Canada, Germany, France, Japan, India, Singapore and Australia and covered several vertical markets: Healthcare, Public Sector, Pharmaceutical, Financial Services, Technology, Defense, Legal, Manufacturing, Energy, Transport and Advisory.
About Blancco Technology Group
Blancco is the industry standard in data erasure and mobile device diagnostics software. Blancco data erasure solutions provide thousands of organizations with the tools they need to add an additional layer of security to their endpoint security policies through secure erasure of IT assets. All erasures are verified and certified through a tamper-proof audit trail.
Blancco data erasure solutions have been tested, certified, approved and recommended by 15+ governing bodies and leading organizations around the world. No other data erasure software can boast this level of compliance with the rigorous requirements set by government agencies, legal authorities and independent testing laboratories.
With Blancco Mobile Insurance, Blancco Mobile Buy-back/Trade-in and Blancco Mobile Retail solutions, organizations can achieve real-time valuation for mobile devices with a simple solution that enables consistent, accurate and measurable testing, including market-leading cracked-glass detection.
Additionally, mobile processors can achieve operational excellence while maximizing profits with Blancco Mobile Diagnostics & Erasure—a purpose-built solution that features our industry-leading Blancco Mobile Workflows for key processing insights across the entire mobile device lifecycle.