• For Buyers
    • Retail News
    • Products & Suppliers
    • Ecommerce
    • Marketing & Management
    • Trade Show News
  • For Suppliers
    • Supplier News
    • Marketing & Management
    • Importing
    • Manufacturers
    • Warehousing
    • Finance
    • Show Exhibiting
  • Wholesale 101
  • Trade Show Calendar
  • Wholesale Products
  • New Suppliers
Facebook Twitter Instagram
Monday, March 20
  • Subscribe
  • Submit Content
  • About Us
    • Contact Us
  • Advertise
    • Display Advertising
    • Email Marketing Campaigns
    • Newsletter Advertising
    • Sponsored Content
    • Lead Generation Services
  • Top Product Sources
Facebook Twitter Instagram
WholesaleCentral.com Blog
  • For Buyers
    • Retail News
    • Products & Suppliers
    • Ecommerce
    • Marketing & Management
    • Trade Show News
  • For Suppliers
    • Supplier News
    • Marketing & Management
    • Importing
    • Manufacturers
    • Warehousing
    • Finance
    • Show Exhibiting
  • Wholesale 101
  • Trade Show Calendar
  • Wholesale Products
  • New Suppliers
WholesaleCentral.com Blog
Home»For Buyers»Marketing & Management»Keep Digital Assets Private
Marketing & Management

Keep Digital Assets Private

PublisherBy PublisherSeptember 1, 20123 Mins Read
Facebook Twitter Email
Share
Facebook Twitter Email

image of data securityIn its third survey on how boards and senior executives approach privacy and security in their organizations’ digital assets, which includes networks, systems and data, Carnegie Mellon CyLab completed the first ever global analysis of cyber governance of major corporations around the world. This year’s survey included international respondents, broadened the scope of inquiry and was sponsored by the RSA, the Security Division of EMC and provider of security and risk management solutions. Querying companies on the Forbes Global 2000 list, the survey collected responses primarily from company CEOs and presidents, representing 52 percent of respondents, as well as board chairs, comprising 24 percent, and corporate secretaries, contributing 15 percent of the replies.

One of the foremost pieces of information gathered was that boards and senior management are still not exercising appropriate governance over the privacy and security of their digital assets, though there has been some improvement since last year. Major areas of concern involved delegating responsibilities for information security. Among those surveyed, 42 percent of company boards rarely or never are required to approve top level policies on privacy and IT security risks; 66 percent of boards rarely or never review or approve the roles and responsibilities of lead personnel responsible for IT and security; and 54 percent rarely or never review annual budgets for privacy and security programs. “There is still an apparent disconnect between boards and senior executives understanding that privacy, security and IT risks are part of enterprise risk management,” writes Jody R. Westby, who prepared the study conclusions.

The study also uncovered a lack of attention to cyber insurance coverage. Nearly 60 percent of respondents reported not reviewing the organization’s coverage for digital assets and the associated risks, such as data breeching and identity theft. Though the percentage is still high, it is an improvement from last year’s report of 65 percent neglecting insurance.

Aside from these areas of concern, several encouraging signs of progress were found. The number of corporations with separate committees dedicated to risk management nearly quadrupled since 2010, meaning that more businesses are interested in delegating the handling of risks to one specific team. Also, companies are expressing more interest in having directors with IT security expertise. Nearly all respondents indicated having an official Risk Management program to help troubleshoot or prevent issues with the company networks and data.

Corporate privacy and security are sensitive issues that set the tone of a work environment. As with all other areas of business policy making, effective information management must come from the top tier of the business and branch out from there. Through regularly reviewing procedures, companies can ensure that private information remains private and security risks are minimal.

security
Share. Facebook Twitter Email
Previous ArticleLotto & Xmas Plants
Next Article Greek Yogurt Soap

Related Posts

2023 Retail Success Guide

January 5, 2023

Creating a Top Tier Loyalty Program

November 29, 2022

6 Easy Ways to Get More Google Reviews for Your Business

November 14, 2022
Sign Up for Buyer Updates
WholesaleCentral.com

Join the Buyer's Network

Get news & updates only for retailers.

Latest Posts

2023 Wholesale Apparel Trends

March 14, 2023

Top Wholesale Easter Products

February 27, 2023

The Future of Sustainable Manufacturing is a Hybrid Approach

February 23, 2023

Make Money with Foreign-Trade Zones

February 22, 2023

Overstock Liquidations

January 25, 2023

5 Essential Tax Season Preparation Tips

January 24, 2023
how-to
Product News

Overstock Liquidations

January 25, 20236 Mins Read

Overstock inventory refers to the excess goods or merchandise that a retailer has on hand…

Retail News

5 Essential Tax Season Preparation Tips

January 24, 202310 Mins Read

Are you ready for tax season? April 18 is approaching quickly, and many day-to-day decisions…

Wholesale 101 for Buyers

How to Create a Google Business Profile

January 18, 20236 Mins Read

Looking for new ways to get your brand noticed? Creating a Google Business Profile can…

Retail News

Using Color Theory in Window Displays to Increase Foot Traffic

December 1, 20224 Mins Read

by Melissa Stivale While we do not often stop to think about how much color…

  • About Us
  • Subscribe
  • Contact Us
  • Advertise
  • Find Wholesale Sources
WholesaleCentral.com

Join the Buyer's Network

Get news & updates only for retailers.

Follow Us:

Copyright © 2023. Sumner Communications, Inc..

Type above and press Enter to search. Press Esc to cancel.