MEASURING TRUST IN PRIVACY AND SECURITY
Ponemon Institute
Sign Up for the Ponemon News Feed for special reports and important updates regarding privacy and security

News & Updates

Ponemon Institute is pleased to announce the release of Flipping the Economics of Attacks, sponsored by Palo Alto Networks. In this study, we look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. As revealed in this research, while some attackers may be motivated by non-pecuniary reasons, such as those that are geopolitical or reputational, an average of 69 percent of respondents say they are in it for the money.

...more


Blog

Welcome to my new blog. I look forward to providing interesting content from our latest research studies. Please stay tuned to some very thought provoking research!

Third Annual Patient Privacy & Data Security Study Released
December 6, 2012, 6:00 am

Could BYOD increase the risks of a healthcare data breach and medical identity theft? The third annual study on Patient Privacy and Data Security reveals the explosion of mobile devices used in healthcare organizations. Most organizations in our study say they permit their employees to bring personally owned devices such as smart phones and tablets and connect to their networks or enterprise systems. While productivity may increase, so does the risk that patient data may end up in the wrong hands. In fact when asked, these organizations admit they are not confident they can make sure these devices are secure. What should hospitals do today? Conduct a privacy risk assessment to identify organizational gaps and create a comprehensive mobile device policy (including detailed guidelines) for all employees and contractors. The policy should address the risks and the security procedures that should be followed. They should also reinforce their mobile device policy with employee education on the importance of safeguarding their mobile devices and how to avoid risky behaviors.  For a copy of the study, please click here: http://www2.idexpertscorp.com/ponemon2012/

2013 State of the Endpoint
December 5, 2012, 7:00 am

Sponsored by Lumension, the 2013 State of the Endpoint is our third annual study that tracks endpoint risk in organizations, the resources to address the risk and the technologies deployed to manage threats.

Edelman Privacy Risk Index
November 15, 2012, 11:03 am

We are very pleased to introduce the Edelman Privacy Risk Index developed in collaboration with Ponemon Institute.  The Index provides a high level risk coefficient specified for various sized business organizations. The Index is derived from Meta analysis of Ponemon research involving more than 6,400 individuals located in 29 countries.  Here is the link to the online calculator:  http://www.edelman.com/privacy-risks/

2012 Web Session Intelligence & Security Report: Business Logic Abuse Edition sponsored by Silver Tail Systems
October 2, 2012, 2:05 am

 


 

Second Annual Patient Privacy Study Released
December 1, 2011, 9:13 am

Widespread use of mobile devices is putting patient data at risk, according to the latest Ponemon Institute research on healthcare providers' patient privacy practices.While 81 percent of respondents say employees in their healthcare organizations are using mobile devices to collect, store and/or transmit some form of PHI, 49 percent admit their organizations are not doing anything to protect these devices. To download a copy of the report click here:  http://www2.idexpertscorp.com/ponemon-study-2011/.

Best Practices in Data Protection Study Released
November 4, 2011, 7:09 pm

 Sponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this study is important because it provides insights on how organizations can be more successful when investing in and building a data protection program. The study's findings reveal five success factors in a data protection program:

  1. A formal data protection strategy for the organization and metrics to determine if the strategy is effective.
  2. Key metrics from a management console and observation and regular testing of data protection solutions.
  3. Data protection technology features that focus on privileged users, restriction of access and outbound communications are considered critical
  4. Centralized management of the data protection program with such features as actionable information, policy administration, reporting, automatic securing of endpoints and monitoring.
  5. Automated policies for detection and prevention of end-user misuse of information assets. 

To download the complete report click here:  <https://prod.secureforms.mcafee.com/content/verify?docID=3E46E43C-2252-487A-885B-4C5F125DFB60&cid=WB290&aName=DP&src=web&aType=report®ion=us>

 

Second annual cost of cyber crime study is released
August 2, 2011, 11:04 am

Today we released our Second Annual Cost of Cyber Crime Study.  Our findings support other research studies suggesting increases in the frequency, severity and overall cost of cyber attacks on private and public sector organizations. Our study is sponsored by HP ArcSight.  I would be very pleased to discuss this year's findings, framework and research methods.  Please feel free to call us directly or send an email to research@ponemon.org to schedule a one-to-one meeting.

Most trusted companies for privacy
July 31, 2011, 10:55 am

Ponemon Institute is releasing our annual Most Trusted Companies for Privacy study this coming week.  This is the eighth year that we conducted a U.S. national consumer study that determines the organizations believed to be most committed to protecting and securing personal information.  Our research also determines the underlying factors that consumers perceive as most important or influential to their trust ratings.   For more information, please contact research@ponemon.org.

Ponemon Releases Cloud Service Provider Study
May 2, 2011, 4:51 pm

Last week with CA Technologies we issued the results of a study of cloud service providers and their views on cloud security. There has been a lot of interest in this study. Readers have reviewed the results and responded with some very good questions and comments. In a nutshell, people – including us – were surprised by the results, which showed that cloud providers didn’t put security as the No. 1 concern in providing their services.

Are we taking adequate steps to protect the critical infrastructure?
April 3, 2011, 11:06 am

Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research revealed that utilities and energy companies in our study are more concerned about preventing downtime that stopping a cyber attack.  In addition, a majority of respondents said that compliance with standards such as NERC CIP is not a top priority.  Most surprisingly, only 16 percent of respondents believe that their organization's existing controls are designed to protect against exploits and attacks through the smart grid.  For more information about this study, please contact research@ponemon.org.

 

Records 51 - 60 of 82 — Jump to page First 1 2 3 4 5 6 7 8 9 Last
Categories
Security (23)
Privacy (22)
global security (1)
Providers (1)