This survey shows the handling of data leakage of sensitive information in organizations in 2012. 72 percent of respondents have defined a policy for the classification and handling of sensitive data as a control for data leakage risk.
Which of the following actions has your organization taken to control data leakage of sensitive information?
Characteristic
Percentage of repondents
Defined a specific policy regarding the classification and handling of sensitive information
72%
Employee awareness programs
68%
Implemented additional security mechanisms for protecting information (e.g. encryption)
57%
Locked down or restricted use of certain hardware (e.g. USBs, Firewall ports)
43%
Used internal auditing for testing of controls
41%
Defined specific requirements for telecommuting/telework regarding the protection of information that is taken outside the office
39%
Implemented data loss prevention tools (e.g. McAfee, Symantec)
38%
Implemented log review tools
38%
Restricted use of instant messaging or email for sensitive sata transmission
31%
Prohibited use of camera devices within sensitive or restricted areas
23%
Restricted access to sensitive information to specific time periods
CIOs, CISOs, CFOs, CEOs and other information security executives
Method of interview
Face-to-face interview, online survey
Supplementary notes
* Ernst & Young received feedback from nearly 1,836 CIOs, CISOs, CFOs, CEOs and other information security executives from 64 countries and across all industry sectors.
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
EY. (November 16, 2012). Which of the following actions has your organization taken to control data leakage of sensitive information? [Graph]. In Statista. Retrieved October 15, 2024, from https://www.statista.com/statistics/205908/handling-of-data-leakage-of-sensitive-information-in-organizations/
EY. "Which of the following actions has your organization taken to control data leakage of sensitive information?." Chart. November 16, 2012. Statista. Accessed October 15, 2024. https://www.statista.com/statistics/205908/handling-of-data-leakage-of-sensitive-information-in-organizations/
EY. (2012). Which of the following actions has your organization taken to control data leakage of sensitive information?. Statista. Statista Inc.. Accessed: October 15, 2024. https://www.statista.com/statistics/205908/handling-of-data-leakage-of-sensitive-information-in-organizations/
EY. "Which of The following Actions Has Your Organization Taken to Control Data Leakage of Sensitive Information?." Statista, Statista Inc., 16 Nov 2012, https://www.statista.com/statistics/205908/handling-of-data-leakage-of-sensitive-information-in-organizations/
EY, Which of the following actions has your organization taken to control data leakage of sensitive information? Statista, https://www.statista.com/statistics/205908/handling-of-data-leakage-of-sensitive-information-in-organizations/ (last visited October 15, 2024)
Which of the following actions has your organization taken to control data leakage of sensitive information? [Graph], EY, November 16, 2012. [Online]. Available: https://www.statista.com/statistics/205908/handling-of-data-leakage-of-sensitive-information-in-organizations/