With the emergence of new G Suite security features, regulations like GDPR, and other privacy concerns, many customers have refocused their 2018 security priorities on G Suite data protection.

Earlier this Summer, Agosto, in conjunction with Virtru, held a webinar to discuss the top G Suite security, compliance, and data privacy concerns for the coming year – and how powerful email protection can make it easier to securely share sensitive information in the cloud.

Here are some of the key trends and takeaways from this discussion, which were sourced from a survey recently conducted by Enterprise Management Associates (EMA) in partnership with Samsung Next, the Center for Democracy and Technology, and Virtru:

You Have a Lot of Data to Protect

One of the more surprising findings in EMA’s survey was how much corporate data requires protection. Respondents reported that 72% of enterprise data needs protection — either for regulatory (40%) or corporate confidentiality reasons (32%).

72.6% of enterprise data requires protection

The Biggest Threat Comes from Inside

While hacks continue to make most of the headlines, it turns out the biggest threat comes from inside an organization.

When asked to identify the actual source of leaks or breaches at their organization, respondents indicated that external actors only accounted for 39% of the leaks or breaches, and that insiders were responsible for a staggering 61% of all actual data leaks. This represents a combination of accidental sharing, phishing/social engineering, and malicious sharing by insiders.

Further, respondents noted a very high degree of inappropriate data sharing by their employees. This finding highlights a huge area of opportunity for enterprises who wish to improve their security posture.

61% of data leaks are caused by employees sharing data they shouldn't

Data Is Most Commonly Leaked Via Email

Email is everywhere. Organizations create, store, and share some of their most valuable data assets through email messages and attachments because it’s the easiest method for collaboration in business environments. That’s why it’s the number 1 source of data leaks.

Rank of data leak methods

Complexity Kills:  The Burden for IT Security

A combination of complexity for administrators and shortcomings in ease of use for end users mean that data protection solutions are less likely to be widely adopted.

Traditional solutions are too hard to use, both for the technology professionals who need to deploy and maintain them and for the business people who need to use them. In fact, it was discovered that complexity actually outpaces cost by more than 3x as a barrier to adoption for IT security personnel. Even if budget is readily available, legacy data protection solutions are clearly too cumbersome for overburdened teams.

Technology Inhibitors

Clearly, a new approach is required.

Best Practice Recommendations:

  • Ensure you’re using the state of the art data protection approaches and test your defenses regularly, going beyond regulatory requirements to ensure corporate sensitive materials have appropriate protections.
  • Train employees in data protection best practices. Set up automatic protections to ensure that sensitive information is secured before it’s shared.
  • Develop mechanisms for auditing employee sharing by email to prevent careless and malicious insiders from facilitating data leaks.
  • Make ease-of-use a key buying criteria when evaluating any user-facing security technology. Your security posture isn’t determined by the products you buy, it’s by the ones your employees are regularly using.
  • Eliminate complexity by seeking data protection products that are easy to deploy and manage.

Get your copy of all the key takeaways from EMA’s survey here.

Interested in learning more about how G Suite and Virtru can help protect your data? Drop us a line.