Channel Daily News

Data Privacy Week: Organizations see strong ROI on privacy spending, says Cisco

Organizations around the world continue to see a strong return on investment from putting resources into privacy, according to a new report from Cisco Systems.

“Privacy’s Return on Investment (ROI) remains high for the third straight year, with
increased benefits, especially for small-to medium-size organizations and higher ROI
for more privacy-mature organizations,” says the report, which was based on a survey of 4,900 respondents in 27 geographies who indicated they are familiar with the privacy processes at their organizations..

Asked to estimate the financial value of the benefits from their privacy investments, the average estimate was up three per cent from US$2.9 million last year to US$3 million
in 2021.

Smaller organizations saw the largest percentage increases. Those with between 50 and 249 employees estimated the value of their privacy investments at US$2 million, up from $1.1 million the year before. Those with between 250 and 499 employees estimated the value of their privacy investments at US$2.5 million, up from US$1.9 million. Benefits at organizations with 1,000 to 9,999 employees remained constant at US$3.4 Million and at the largest organizations with more than 10,000 employees, estimated benefits fell slightly from US$4.0 million to US$3.8 million.

The report was released Wednesday to coincide with Data Privacy Week. A number of  privacy and security firms also released comments this week.

Data Privacy Week is a time for organizations to set goals for implementing best practices that improve data protection and cybersecurity, said Karen Worstell, senior cybersecurity strategist at VMware. These include robust vulnerability management, implementing multifactor authentication, threat hunting, and network micro-segmentation, among others.

Data privacy is becoming more important due to the increase in data risk and loss of business information, noted Adrian Moir, technology strategist and principal engineer at Quest Software. With critical vulnerabilities found last year in Microsoft Exchange, Kaseya VSA, and in Log4j, organizations are recognizing the business need for data privacy. Looking toward the future, we’re likely to see the way data is perceived, used, and regulated will become more refined, he said.

Trend Micro urged organizations to beef up their data privacy by patching systems and networks, educating employees about data threats and how to handle an attack, regularly performing security audits and creating an effective disaster recovery plan.

“It is far easier to break trust than to build it, or rebuild it.,” noted Tim Mackey, principal security strategist at Synopsys Cybersecurity Research Center. “Trust is effectively a series of small successes that in the aggregate represent the value of a brand. A business that only requests a minimum of data from their customers and only retains it for the minimum time period required to satisfy the customer’s expectations reduces their potential exposure should a data breach occur. After all, the only data contained in a data breach is data that was available to breach, so it stands to reason that an abundance of customer data and profiles increases the interest cybercriminals might have in targeting specific businesses.”

With data breaches becoming more frequent, Data Privacy Day is an excellent time for individuals and businesses to reflect on their current privacy practices and ensure they are building the safest habits to protect themselves and their company from cybercriminals, said Geoff Bibby, SVP of small and medium-sized business and consumer strategy at OpenText.

“Understanding how your data is being used is the first step, but actively securing your data is the most important step. Organizations and users should evaluate their current authentication practices to ensure they are building the safest habits to protect themselves and sensitive data from bad actors. It is critical that authentication controls are not only in place, but that organizations take it a step further by deploying two-factor authentication (2FA). Implementing 2FA provides an extra layer of security by making users confirm their identity, most often via a unique code sent to the user’s device, email address or through an authenticator app, after entering their username and password.”

In its report, Cisco recommends organizations:

Exit mobile version