Thought Leadership

Initiative Background

Back to initiatives list »

Getting Control of Document Flow

Exploring Exposure and Risk In Document-Related Data Breaches

In today’s connected, Internet-enabled world, the potential for theft and exposure of sensitive data and information to unauthorized parties is an area of critical danger and vulnerability. This rising security threat doesn’t only come from malicious outsiders infiltrating corporate IT systems.  It also, very frequently, comes from people within an organization who by accident or intent release sensitive information, often in the form of documents. Employees themselves continue to be the #1 cause of security-related incidents. 

In fact, according to a 2015 Data Breach Industry Forecast by Experian, 59 percent of security incidents in the last year could be attributed to employees, either due to human error and malicious intent. According to another recent study, 90 percent of U.S. organizations have experienced leaks of sensitive information via documents in the last 12 months. Indeed, one of the most infamous security breaches since the beginning of the 21st Century was the 2010 transfer of classified documents by Army Private Bradley Manning to the website Wikileaks.

“Getting Control of Document Flow: Exploring Exposure and Risk in Document-Related Data Breaches,” is a new study to be conducted by the Business Performance Innovation (BPI) Network in partnership with Foxit Software.  The study, based on a global survey of business professionals and interviews with select executives, will bring to life the increasing challenge of maintaining document security in the Internet age. The study will look at levels of concern, prevalence of incidents, causes of breaches, types of sensitive information lost or compromised, most common remedial actions, and other forces and factors behind document-related security breaches.

Sponsor

FoxIt
Foxit is a leading software provider of fast, affordable and secure PDF solutions. Businesses and consumers increase productivity by using Foxit's cost effective products to securely work with PDF documents and forms. Foxit is the #1 pre-installed PDF software, shipped on one-third of all new Windows PCs, including those from HP®, Acer, and ASUS®. Foxit's Software Development Kits (SDKs) help developers reduce costs and improve time to market by easily integrating industry leading PDF technology into application workflows. This technology shares the same underlying technology that powers Google's open-source PDFium project. Winner of numerous awards, Foxit has over 325 million users and has sold to over 100,000 customers located in more than 200 countries. Since Foxit products are ISO 32000-1/PDF 1.7 standard compliant, they are compatible with your existing PDF documents and forms.
Visit website »

Studies

Getting Control of Document Flow
A new study by the BPI Network that explores the incidence, prevention practices, and ramifications of document security breaches for organizations of all sizes. The study underscores a glaring lack of effective security practices surrounding the way companies create and share confidential and sensitive documents.
Download »
back to top

Media Coverage

March 16, 2017 - Security Practices Lacking Around Confidential Documents, Study Reveals
Bob Violino, Information Management
In a global survey of more than 200 managers and information workers conducted in the fourth quarter of 2016 and first quarter of 2017, 60% of respondents said they or someone they know have accidently sent out a document they shouldn’t have. Read more »

March 16, 2017 - Securing Document Flow: Exploring Exposure and Risk
Help Net Security
There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the BPI Network. In a global survey of managers and information workers, 6 out of every 10 respondents said they or someone they know have accidently sent out a document they shouldn’t have. Read more »

March 16, 2017 - Companies Not Doing Enough to Protect High-Value Documents
Resilience Today
Read more »

March 15, 2017 - Employers Rattled by Document Security Concerns
Jack Craver, Benefits Pro
Cyberattacks that have successfully targeted major corporations, government entities and health care systems have made people realize whatever security precautions they have been taking to protect sensitive information, they probably should be doing much more. Read more »

March 14, 2017 - Study Shows Ignorance of and Critical Need to Secure Important Documents
Danielle Correa, SC Media
New research from the Business Performance Innovation (BPI) Network says there is a widespread and increasing need to improve security practices surrounding confidential documents in most organisations today. Read more »

March 14, 2017 - Security of Confidential Documents a Significant Problem
Tech Central.ie
This is one incident that is highlighted in a new study by the Business Performance Innovation Network. The study entitled “Getting Control of Document Flow: Exploring Exposure and Risk In Document-Related Data Breaches,” was sponsored by Foxit Software, shows there is a growing need to improve security practices surrounding confidential documents in most organisations today. In a global survey of managers and information workers, six out of every 10 respondents said they or someone they know have accidentally sent out a document they should not have. Read more »

March 14, 2017 - The Security Of Confidential Documents Is A Significant Problem For Most Companies
SmallBusiness.co
Some 89 per cent of survey takers believe document security risks are growing in their organisation due to increased connectivity and the proliferation of mobile devices. The accidental sharing of confidential documents with a wrong party is by far their biggest concern. Read more »

March 14, 2017 - Why the Security of Confidential Documents is a Problem for Enterprises
Security Magazine
There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the Business Performance Innovation (BPI) Network.  In a global survey of managers and information workers, 6 out of every 10 respondents said they or someone they know have accidently sent out a document they shouldn't have. Read more »

March 13, 2017 - Report Finds the Security of Confidential Documents is a Significant Problem
Ryan Francis, CSO
An executive at an insurance firm sent out a document that contained confidential information, including employees’ names, email addresses, birthdates, Social Security numbers, employee ID numbers, office locations, and the details of their medical insurance plans. The problem was the email was accidentally sent to an external mailing blast list. Read more »

back to top

Facts & Stats

For companies that did experience a data breach in the last year (31%), 48% say it was the user who exposed data intentionally or accidentally from a cloud service. (Source)

Research shows that there have been 2,928 publicly disclosed attacks so far in 2016 involving greater than 2.2 billion records in total. (Source)

Addressing the document disconnect can provide exceptional benefits in terms of reduced cost and risk. Line-of-business leaders we surveyed estimate that fully addressing the gaps in their departmental document processes could yield a 36% increase in revenue, 30% reduction in cost, and 23% reduction in business/compliance risk. (Source)

53% of small business have reinevnted their business to "stay afloat or competitive" in the last two years.  (Source)

IDC estimates that the typical enterprise with 1,000 knowledge workers wastes $2.5 million to $3.5 million per year searching for nonexistent information, failing to find existing information, or recreating information that can't be found. (Source)

back to top

Articles

October 13, 2016 - Poor Document Management Often to Blame for Compromised Sensitive Information
ITProPortal
Read more »

October 13, 2016 - Hacker Steals at Least 58 Million Personal Records From Data Management Firm
Digital Trends
Read more »

October 12, 2016 - Study: Hackers Target Private Information in Document Files
Top Tech News
Read more »

October 12, 2016 - Employee Errors Cause Most Data Breach Incidents in Cyber Attacks
PR Newswire
Read more »

October 11, 2016 - A Breach Alone Means Liability
NetworkWorld
Read more »

back to top

White Papers

Document Management Return on Investment
While it may seem obvious in general terms that a managed document environment would provide significant benefits, justification in clear-cut financial and competitive terms is less clear. This whitepaper provides a road map for clarifying the ROI process for a Document Management System. Read more »

Addressing the Document Disconnect: Hidden Opportunity, Big Payoff
An IDC global study of more than 1,500 line-of-business leaders, IT leaders, and information workers in the United States, the United Kingdom, France, Germany, Australia, and Japan to assess the effectiveness of their organization’s document-based business processes. Read more »

The Business Case for Enterprise Content Management
Driven by the need to control exponentially increasing amounts of information that resides across the enterprise, many organizations are looking to create order among content chaos by leveraging ECM and document management solutions. An effective ECM solution will reduce the time, cost and complexity associated with storing, locating and collaborating on documents and data throughout the information life cycle. Read more »

PRESS RELEASES

GLOBAL STUDY TO EXPLORE BUSINESS VALUE OF THE INDUSTRIAL INTERNET OF THINGS

Learn more >>

NEW RESEARCH FROM PENTON'S IOT INSTITUTE FINDS PRIVACY & ORGANIZATIONAL READINESS ARE THE PRIMARY CHALLENGES OF IMPLEMENTING IOT

Learn more >>