SlideShare a Scribd company logo
Security
in the New World of
Content and Documents
Ponemon Institute, 2015 Security Breaches Study; Ponemon Institute, 2013 Confidential Documents at Risk Study
Security is a Top Initiative to Protect
from External Attacks
Top data security breaches:
• 39% business information
• 27% customer information
• 14% intellectual property
• 10% employee information
0% 10% 20% 30% 40% 50%
Cloud Computing
Business Intelligence
Security
Mobility
% of respondents
75%
Number of Companies Reporting a
Data Security Breach
Top Areas of Focus for
IT Professionals in 2015
Security is a Top Initiative to Protect
from Internal Risks
Feel that their organization
is exposed to considerable
risk due to stored content
that is not correctly
identified
Of U.S. organizations
experienced leakage or loss
of sensitive or confidential
documents
AIIM Industry Watch Content Analytics , July 2015; IDC InfoBrief: The Document Disconnect, 2015
54% 90%
.
76%
Say document process
issues impact revenue
recognition or create
auditor issues
Are Your Document Workflows
Creating Risk for Your Company?
• Paper creates risk
• Free conversion sites create risk
• Ad-hoc sharing creates risk
• Lack of visibility and traceability creates risk
Old Paper Habits Die Hard—Or Not at All
58%
Default to printing
and signing a
document received
via email
27%
Print PDF documents
in order to review
them
“The State of Document Productivity in the Workplace.” Nitro, 2014
Old Paper Habits Create Risk
• Paper is at the heart of a
significant percentage of
security breaches
• Paper is too easy to destroy.
• Paper is impossible to track,
version, or protect.
23%
61%
Of major breaches (affecting
more than 500 individuals)
involve paper records
61% of small breaches involve
paper records
Ponemon Institute, 2013 Confidential Documents at Risk Study
Unvetted PDF Conversion Sites
Create Risk
• Are your employees searching
for Free PDF Conversion tools
and loading their documents
onto the internet?
• How much can you trust these
sites with your sensitive and
confidential company,
customer, and employee
information?
Vilnius, Lithuania?
Ad-hoc Sharing Creates Risk
Ponemon Institute, 2012 Security Breaches Study
77% do not provide secure
document sharing/mobile access
solutions for their employees
85% use insecure file sharing tools
such as DropBox, Box.net, USB
drives, email attachments
Public Drives USB Drives Email Attachments
62% 68% 71%
Most Common Methods of Theft or Loss
Lack of Visibility and Traceability
Create Risk
IDC InfoBrief: The Document Disconnect, 2015
55%
Can’t tell whether a document has been
viewed/reviewed/signed by appropriate
people and cite difficulty getting status
and visibility into the process
38%
Cite difficulty relating documents or
versions of documents into important
context
Business Leaders See Upside Potential
in Improving Document Security
IDC InfoBrief: The Document Disconnect, 2015
Execs and managers in sales, HR, procurement, legal,
and other departments estimate that fixing the
‘document disconnect’ will significantly reduce risk.
23%
Risk Reduction
4 Things You Can Start Doing Today
Provide workers access to the right tools
Eliminate paper wherever possible
Prescribe standardized collaboration practices
Investigate a Smart Documents Platform
Thank you!
Please contact us for further information, or to
learn how Nitro can help your organization.
Visit our Website: www.GoNitro.com
Visit our Blog: blog.gonitro.com
Follow us on Twitter: @NitroHQ

More Related Content

PDF
An Identity Crisis at the Center of Every IoT Product
PPTX
Social Media Can Not Be Ignored
PDF
Eliminate the 49% of Documents that Contain Data Breaches Webinar
PDF
HP Education Solutions
PDF
Public Cloud is Not Always the Answer... but Sometimes it is
PPT
Presentation to Irish ISSA Conference 12-May-11
PPTX
Helen Patton - Cross-Industry Collaboration
PPTX
Comprehensive Data Leak Prevention
An Identity Crisis at the Center of Every IoT Product
Social Media Can Not Be Ignored
Eliminate the 49% of Documents that Contain Data Breaches Webinar
HP Education Solutions
Public Cloud is Not Always the Answer... but Sometimes it is
Presentation to Irish ISSA Conference 12-May-11
Helen Patton - Cross-Industry Collaboration
Comprehensive Data Leak Prevention

What's hot (20)

PPTX
8 building blocks for a high performance school IT network
PPTX
Keith Fricke - CISO for an Hour
PPTX
Getting your Strategy Right – in a SMAC World!
PPT
Module0&1 intro-foundations-b
PPTX
Remote auditing: the pros and cons
PPTX
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
PPTX
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PDF
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
PDF
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
PDF
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
PPTX
Putting People First to Avoid Implementation Pitfalls
PPTX
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
PPTX
Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PDF
Ruben Melendez - Economically Justifying IT Security Initiatives
PPTX
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
PDF
Security in the News
PDF
2015 Secureworld_effectively_managing_information_risk
PDF
Cyber Risks & Liabilities - Cyber Security for Small Businesses
8 building blocks for a high performance school IT network
Keith Fricke - CISO for an Hour
Getting your Strategy Right – in a SMAC World!
Module0&1 intro-foundations-b
Remote auditing: the pros and cons
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
Putting People First to Avoid Implementation Pitfalls
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Ruben Melendez - Economically Justifying IT Security Initiatives
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Security in the News
2015 Secureworld_effectively_managing_information_risk
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Ad

Similar to Security in the New World of Content and Documents (20)

PDF
Digital trust and cyber challenge now extends beyond the Enterprise
PDF
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
PDF
Security Awareness Training: Are We Getting Any Better at Organizational and ...
PDF
Jonathan raymond 2010 rotman telus - atlseccon2011
PPT
Shariyaz abdeen data leakage prevention presentation
PDF
2014 Executive Breach Preparedness Research Report
PDF
5 Questions Executives Should Be Asking Their Security Teams
PDF
How to Catch a Wolf in Sheep's Clothing
PPT
Information Leakage - A knowledge Based Approach
PPTX
Survey: Insider Threats and Cyber Security
PDF
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
PDF
CompTIA Security Study [Report]
PDF
Best practices for_implementing_security_awareness_training
PDF
Protecting Corporate Information in the Cloud
PDF
Cybersecurity Series - Cyber Defense for Internal Auditors
PDF
Thriving in the New World of Content and Documents
PDF
SVB Cybersecurity Impact on Innovation Report - Overview
PDF
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
PPTX
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
PDF
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Digital trust and cyber challenge now extends beyond the Enterprise
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Jonathan raymond 2010 rotman telus - atlseccon2011
Shariyaz abdeen data leakage prevention presentation
2014 Executive Breach Preparedness Research Report
5 Questions Executives Should Be Asking Their Security Teams
How to Catch a Wolf in Sheep's Clothing
Information Leakage - A knowledge Based Approach
Survey: Insider Threats and Cyber Security
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
CompTIA Security Study [Report]
Best practices for_implementing_security_awareness_training
Protecting Corporate Information in the Cloud
Cybersecurity Series - Cyber Defense for Internal Auditors
Thriving in the New World of Content and Documents
SVB Cybersecurity Impact on Innovation Report - Overview
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Ad

More from Nitro, Inc. (8)

PPT
Customer Survey Proves IT Satisfaction in Key Performance Areas
PDF
Sustainability in the New World of Content and Documents
PDF
Nitro Infographic: Are Your Document Practices Slowing Down Your Productivity?
PDF
A Brief History of Electronic Signatures
PDF
The Paperless Office: Why it Hasn't Happened, and Why It's Going To
PPTX
How Your Document Habits are Destroying Productivity
PDF
Breaking Bad Habits: Escape the Document Productivity Drain
PDF
Nitro Pro 9 - Live Demo Presentation
Customer Survey Proves IT Satisfaction in Key Performance Areas
Sustainability in the New World of Content and Documents
Nitro Infographic: Are Your Document Practices Slowing Down Your Productivity?
A Brief History of Electronic Signatures
The Paperless Office: Why it Hasn't Happened, and Why It's Going To
How Your Document Habits are Destroying Productivity
Breaking Bad Habits: Escape the Document Productivity Drain
Nitro Pro 9 - Live Demo Presentation

Recently uploaded (20)

PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PDF
AutoCAD Professional Crack 2025 With License Key
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
assetexplorer- product-overview - presentation
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
iTop VPN Crack Latest Version Full Key 2025
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
17 Powerful Integrations Your Next-Gen MLM Software Needs
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
Monitoring Stack: Grafana, Loki & Promtail
Design an Analysis of Algorithms I-SECS-1021-03
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Weekly report ppt - harsh dattuprasad patel.pptx
AutoCAD Professional Crack 2025 With License Key
Wondershare Filmora 15 Crack With Activation Key [2025
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Computer Software and OS of computer science of grade 11.pptx
assetexplorer- product-overview - presentation
Design an Analysis of Algorithms II-SECS-1021-03
Download FL Studio Crack Latest version 2025 ?
iTop VPN Crack Latest Version Full Key 2025

Security in the New World of Content and Documents

  • 1. Security in the New World of Content and Documents
  • 2. Ponemon Institute, 2015 Security Breaches Study; Ponemon Institute, 2013 Confidential Documents at Risk Study Security is a Top Initiative to Protect from External Attacks Top data security breaches: • 39% business information • 27% customer information • 14% intellectual property • 10% employee information 0% 10% 20% 30% 40% 50% Cloud Computing Business Intelligence Security Mobility % of respondents 75% Number of Companies Reporting a Data Security Breach Top Areas of Focus for IT Professionals in 2015
  • 3. Security is a Top Initiative to Protect from Internal Risks Feel that their organization is exposed to considerable risk due to stored content that is not correctly identified Of U.S. organizations experienced leakage or loss of sensitive or confidential documents AIIM Industry Watch Content Analytics , July 2015; IDC InfoBrief: The Document Disconnect, 2015 54% 90% . 76% Say document process issues impact revenue recognition or create auditor issues
  • 4. Are Your Document Workflows Creating Risk for Your Company? • Paper creates risk • Free conversion sites create risk • Ad-hoc sharing creates risk • Lack of visibility and traceability creates risk
  • 5. Old Paper Habits Die Hard—Or Not at All 58% Default to printing and signing a document received via email 27% Print PDF documents in order to review them “The State of Document Productivity in the Workplace.” Nitro, 2014
  • 6. Old Paper Habits Create Risk • Paper is at the heart of a significant percentage of security breaches • Paper is too easy to destroy. • Paper is impossible to track, version, or protect. 23% 61% Of major breaches (affecting more than 500 individuals) involve paper records 61% of small breaches involve paper records Ponemon Institute, 2013 Confidential Documents at Risk Study
  • 7. Unvetted PDF Conversion Sites Create Risk • Are your employees searching for Free PDF Conversion tools and loading their documents onto the internet? • How much can you trust these sites with your sensitive and confidential company, customer, and employee information? Vilnius, Lithuania?
  • 8. Ad-hoc Sharing Creates Risk Ponemon Institute, 2012 Security Breaches Study 77% do not provide secure document sharing/mobile access solutions for their employees 85% use insecure file sharing tools such as DropBox, Box.net, USB drives, email attachments Public Drives USB Drives Email Attachments 62% 68% 71% Most Common Methods of Theft or Loss
  • 9. Lack of Visibility and Traceability Create Risk IDC InfoBrief: The Document Disconnect, 2015 55% Can’t tell whether a document has been viewed/reviewed/signed by appropriate people and cite difficulty getting status and visibility into the process 38% Cite difficulty relating documents or versions of documents into important context
  • 10. Business Leaders See Upside Potential in Improving Document Security IDC InfoBrief: The Document Disconnect, 2015 Execs and managers in sales, HR, procurement, legal, and other departments estimate that fixing the ‘document disconnect’ will significantly reduce risk. 23% Risk Reduction
  • 11. 4 Things You Can Start Doing Today Provide workers access to the right tools Eliminate paper wherever possible Prescribe standardized collaboration practices Investigate a Smart Documents Platform
  • 12. Thank you! Please contact us for further information, or to learn how Nitro can help your organization. Visit our Website: www.GoNitro.com Visit our Blog: blog.gonitro.com Follow us on Twitter: @NitroHQ