Thought Leadership

Initiative Background

Back to initiatives list »

Getting Control of Document Flow

Exploring Exposure and Risk In Document-Related Data Breaches

In today’s connected, Internet-enabled world, the potential for theft and exposure of sensitive data and information to unauthorized parties is an area of critical danger and vulnerability. This rising security threat doesn’t only come from malicious outsiders infiltrating corporate IT systems.  It also, very frequently, comes from people within an organization who by accident or intent release sensitive information, often in the form of documents. Employees themselves continue to be the #1 cause of security-related incidents. 

In fact, according to a 2015 Data Breach Industry Forecast by Experian, 59 percent of security incidents in the last year could be attributed to employees, either due to human error and malicious intent. According to another recent study, 90 percent of U.S. organizations have experienced leaks of sensitive information via documents in the last 12 months. Indeed, one of the most infamous security breaches since the beginning of the 21st Century was the 2010 transfer of classified documents by Army Private Bradley Manning to the website Wikileaks.

“Getting Control of Document Flow: Exploring Exposure and Risk in Document-Related Data Breaches,” is a new study to be conducted by the Business Performance Innovation (BPI) Network in partnership with Foxit Software.  The study, based on a global survey of business professionals and interviews with select executives, will bring to life the increasing challenge of maintaining document security in the Internet age. The study will look at levels of concern, prevalence of incidents, causes of breaches, types of sensitive information lost or compromised, most common remedial actions, and other forces and factors behind document-related security breaches.

Sponsor

FoxIt
Foxit is a leading software provider of fast, affordable and secure PDF solutions. Businesses and consumers increase productivity by using Foxit's cost effective products to securely work with PDF documents and forms. Foxit is the #1 pre-installed PDF software, shipped on one-third of all new Windows PCs, including those from HP®, Acer, and ASUS®. Foxit's Software Development Kits (SDKs) help developers reduce costs and improve time to market by easily integrating industry leading PDF technology into application workflows. This technology shares the same underlying technology that powers Google's open-source PDFium project. Winner of numerous awards, Foxit has over 325 million users and has sold to over 100,000 customers located in more than 200 countries. Since Foxit products are ISO 32000-1/PDF 1.7 standard compliant, they are compatible with your existing PDF documents and forms.
Visit website »
back to top

Facts & Stats

For companies that did experience a data breach in the last year (31%), 48% say it was the user who exposed data intentionally or accidentally from a cloud service. (Source)

Research shows that there have been 2,928 publicly disclosed attacks so far in 2016 involving greater than 2.2 billion records in total. (Source)

Addressing the document disconnect can provide exceptional benefits in terms of reduced cost and risk. Line-of-business leaders we surveyed estimate that fully addressing the gaps in their departmental document processes could yield a 36% increase in revenue, 30% reduction in cost, and 23% reduction in business/compliance risk. (Source)

53% of small business have reinevnted their business to "stay afloat or competitive" in the last two years.  (Source)

IDC estimates that the typical enterprise with 1,000 knowledge workers wastes $2.5 million to $3.5 million per year searching for nonexistent information, failing to find existing information, or recreating information that can't be found. (Source)

back to top

Articles

October 13, 2016 - Poor Document Management Often to Blame for Compromised Sensitive Information
ITProPortal
Read more »

October 13, 2016 - Hacker Steals at Least 58 Million Personal Records From Data Management Firm
Digital Trends
Read more »

October 12, 2016 - Study: Hackers Target Private Information in Document Files
Top Tech News
Read more »

October 12, 2016 - Employee Errors Cause Most Data Breach Incidents in Cyber Attacks
PR Newswire
Read more »

October 11, 2016 - A Breach Alone Means Liability
NetworkWorld
Read more »

back to top

White Papers

Document Management Return on Investment
While it may seem obvious in general terms that a managed document environment would provide significant benefits, justification in clear-cut financial and competitive terms is less clear. This whitepaper provides a road map for clarifying the ROI process for a Document Management System. Read more »

Addressing the Document Disconnect: Hidden Opportunity, Big Payoff
An IDC global study of more than 1,500 line-of-business leaders, IT leaders, and information workers in the United States, the United Kingdom, France, Germany, Australia, and Japan to assess the effectiveness of their organization’s document-based business processes. Read more »

The Business Case for Enterprise Content Management
Driven by the need to control exponentially increasing amounts of information that resides across the enterprise, many organizations are looking to create order among content chaos by leveraging ECM and document management solutions. An effective ECM solution will reduce the time, cost and complexity associated with storing, locating and collaborating on documents and data throughout the information life cycle. Read more »

PRESS RELEASES

GLOBAL STUDY TO EXPLORE BUSINESS VALUE OF THE INDUSTRIAL INTERNET OF THINGS

Learn more >>

NEW RESEARCH FROM PENTON'S IOT INSTITUTE FINDS PRIVACY & ORGANIZATIONAL READINESS ARE THE PRIMARY CHALLENGES OF IMPLEMENTING IOT

Learn more >>