Industrial manufacturing
Industrial Internet of Things | Industrial materials | Equipment Maintenance and Repair | Industrial programming |
home  MfgRobots >> Industrial manufacturing >  >> Industrial Internet of Things >> Internet of Things Technology

Dell Survey Reveals Widespread Security Lapses in Large Enterprises

Dell recently conducted a survey of 2,608 global professionals working for enterprises with 250 or more employees. The findings are startling and have implications for any organization that handles private or corporate data.

Today, we entrust corporations with our most sensitive information. Whether it’s Google safeguarding our search queries, cloud services monitoring our health data, or e‑commerce sites protecting our finances, the stakes are high.

Phishing Employees for Company Information

Data security is only as strong as the processes that protect it. Many high‑profile breaches stem from phishing attacks that trick employees into revealing credentials or confidential data. Verizon’s 2023 report highlighted phishing as a top threat to enterprise security.

Phishing is a form of social engineering where an attacker convinces an employee to disclose information they should not. Common tactics include:

See also: Will these Chinese satellites provide hackproof data security?

What Dell’s Survey Discovered

In Dell’s End‑User Security Survey, 72% of respondents admitted they would share sensitive, confidential, or regulated company data under certain circumstances. The reasons varied:

Dell Survey Reveals Widespread Security Lapses in Large Enterprises

The data reveal a general lack of caution. Employees often take shortcuts when they believe it will help them work more efficiently, viewing stringent security protocols as obstacles.

Unsafe Practices Are Common

Unsafe data‑sharing habits extend beyond direct disclosure. 45% of participants admitted to engaging in behaviors that many organizations would prohibit.

For instance, in January, it was revealed that the official Twitter account of the U.S. President was protected by a Gmail address. Such incidents underscore the risks of using personal email for sensitive communications.

These findings illustrate how well‑meaning employees can inadvertently compromise corporate security. The hope is that insights like these will motivate IT leaders and business executives to refine security protocols and foster a culture of compliance.


Internet of Things Technology

  1. 5 Essential Security Practices for Protecting Data with AWS Backup
  2. From Field Sensors to Strategic Insights: Leveraging IIoT Data with IXON Cloud
  3. Harnessing Data Visualization for IoT and AI Insights
  4. Tableau: Turning Raw Data into Strategic Insight
  5. Master Enterprise Data Management in 7 Proven Steps
  6. ERP Systems: The Backbone of Industry 4.0 Data Integration
  7. Mastering Data Migration: Proven Best Practices for Seamless Platform Transitions
  8. Modernize Your Maintenance Strategy with Proven CMMS Best Practices
  9. 2022 Cybersecurity Landscape: Scope and Impact on IT
  10. Ensuring Data Security in the Cloud: Protecting Your Information with Confidence