71% of UK C-suite Willing to Cover up a Data Breach if they Could Escape Fines Finds nCipher Survey
nCipher Security, the provider of trust, integrity and control for business critical information and applications, reveals UK IT leaders are alarmingly willing to cover up a data breach, with more than 3 in 5 (61%) saying they would do so if it meant they could escape fines.
It is now over a year since the implementation of the EU General Data Protection Regulation (GDPR), which obligates organisations to disclose breaches of personal data within 72 hours of becoming aware, when feasible. However, senior business leaders are more willing than managers or directors to cover up their organisation falling victim to a data breach, with 71% at C-level saying they would do so, compared to 57% of the latter category.
Ahead of the 2019 InfoSecurity Europe conference, nCipher Security surveyed 250 IT decision makers with responsibility over security purchases, revealing attitudes towards data breaches, regulation, security training and emerging technologies.
Investment in security training met by lack of employee engagement
While investment in technology is the biggest driver of security spending over the next 12 months, employee training and education is not far behind, taking up 29% of the average budget. However, despite 83% of businesses providing cyber training to staff at all levels, several factors are highlighted as major challenges to employee engagement.
For example, 66% said that they were hampered by a lack of skilled resource in-house to conduct the training, while the same percentage of respondents were challenged by an unwillingness to change process and behaviours.
In addition, 55% of IT leaders pinpointed a lack of support from the board and wider C-suite as a challenge, as well as a lack of best practice guidelines to work towards and implement (63%). Interestingly, all of these challenges were found to be much more acute within mid-sized companies (250-999 employees).
Emerging technology – a double-edged sword for security
Cloud and Internet of Things (IoT) were revealed to be the emerging technologies most widely seen as a threat to organisations, at 63% and 62% respectively. At the same time, 80% confirmed that they are using these kinds of emerging technologies to “better identify threats to their business”.
This demonstrates that businesses are continuing to push ahead with the adoption of innovative but experimental technology to gain an advantage and maintain relevance in their markets even though they might not have the right skills in place. However, this is tempered by a risk factor and scepticism towards these same technologies that is felt most keenly by those at C-Level within the business, creating an interesting paradox that organisations seem to be struggling to navigate.
ePR and GDPR causing confusion
This sense of risk is exacerbated by a compliance and regulation landscape that is becoming ever more complicated, and indeed costly – 30% of the average cyber security budget is spent on meeting compliance needs. GDPR isn’t the only data regulation for businesses to concern themselves with; later this year it will be complemented by the ePrivacy Regulation (ePR), also enacted by the European Union. While 92% of respondents are aware of the latter, just 32% completely understand how it builds on GDPR and 37% are unaware of how it will affect their organisation.
Clearly, there is much more for IT leaders to do to educate themselves and prepare their business for the impact. If the correct steps towards GDPR compliance have already been taken, businesses will be well on track, however, there needs to be a greater awareness of regulatory nuance and how this will impact the way they collect and use customer data.
Peter Galvin, chief strategy and marketing officer, nCipher Security says:
“Organisations are under a greater obligation than ever to disclose data breaches, particularly when personal information is at risk, but evidently many IT leaders – particularly at C-Level - still feel they can avoid being subject to fines and other punitive measures from regulatory bodies.
“By implementing the right security measures to protect their business critical information and applications up front by using tools such as encryption, investing in training and talent as well as understanding the regulatory landscape, businesses can take steps to avoid a damaging breach in the first place.”
Other key findings include:
Just a quarter (28%) of organisations provide security training when employees join, and this lack of immediate training leaves them at risk
Only 63% of businesses update training and repeat annually, meaning the majority of employees are unaware of the latest threats and how to protect themselves
Over 8 in 10 (83%) have a plan in place if they were to become a victim of a data breach. This figure falls to 73% in businesses employing 1-249 people
C-level respondents are concerned about emerging or future technologies as a threat to their business, much more so than their counterparts at manager and director level. The biggest discrepancy is regarding blockchain, with 71% of the former category seeing it as a threat as opposed to 51% of the latter
77% of organisations have plans in place to revisit or update their business approach to cyber security, based on emerging or future technologies.
Latest Jobs
-
- Public Sector Cyber Security Sales | UK
- England
- N/A
-
Public Sector Cyber Security Sales | UK UK | Remote / Hybrid A cyber security provider is seeking a Public Sector Sales professional to drive growth across UK government and public sector organisations. Must have current Cyber Security sales experience. Responsibilities Generate new business selling cyber security solutions into UK public sector Build relationships with CIO, CISO and senior technology stakeholders Manage the full sales cycle from opportunity to contract close Develop pipeline across central government, local government and public sector bodies Support bids, tenders and framework opportunities Experience Proven cyber security sales experience in the UK Track record selling into public sector organisations Familiarity with CCS, G Cloud or other government frameworks Strong stakeholder engagement and deal management skills Location UK based Security Requirements Eligible to obtain UK Security Clearance
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project
-
- Active Directory | RBA engineer | UK Remote | SC Clearable
- United Kingdom
- N/A
-
Technical Active Directory (AD) and RBA specialist needed to play a key part in complex, enterprise scale Active Directory and access transformation programmes. You will work alongside senior team, helping reshape access models, modernise legacy directory structures and strengthen security posture across secure environments. This is hands on delivery within high impact projects where your work directly improves access control, compliance and operational resilience. Active UK Security Clearance required. This is a remote role with client travel. Implementation of Role Based Access Control across large AD estates Restructuring complex permission models, security groups and delegated access Supporting domain controller upgrades and core directory improvements Applying security hardening standards and remediating audit findings Enhancing authentication, policy and access governance frameworks Troubleshooting and resolving technical AD challenges within live environments Producing robust technical documentation and identifying project risks You must have the following technical experience Enterprise Active Directory administration Role Based Access and permission remediation OU design and governance Group Policy management Security group delegation models DNS and DHCP services Kerberos authentication / NTLM PowerShell scripting and automation Azure AD | Entra ID Hybrid identity environments Identity Governance PAM
-
- Identity and Access Management Consultant (Saviynt & Microsoft Entra) | UK
- United Kingdom
- N/A
-
Role summary Technical IAM consultant delivering identity governance and cloud identity solutions to enterprise clients. What you will do Implement / Configure / Deploy Saviynt IGA / Microsoft Entra solutions: Lead technical workshops, gather requirements and translate into solution designs. Troubleshoot complex issues, support testing and deployments. Produce technical artefacts and configuration guides. Key skills Hands-on Saviynt IGA experience (workflow, connectors, access governance). Strong practical knowledge of Microsoft Entra ID / Azure AD identity and access controls. Understanding of identity protocols (SAML, OAuth, OpenID Connect) and hybrid identity. Experience with APIs / REST for integrations and automation. What we are looking for Proven delivery experience in IAM / IGA projects, preferably in consulting. Confident communicator with client-facing delivery exposure.