- 21 | 10 | 2024
By Steve Townley, Chief Information Officer
As organisations shift towards an increasingly digital world, the question arises – how can we truly safeguard the information we store from the very real threats posed by cybercrime? In today’s environment, just how safe is “safe”?
We are constantly moving our data into digital formats – not just the information we create today but also digitising legacy content to enhance collaboration and efficiency. With more organisations operating in the cloud, it seems idyllic; information available at our fingertips, seamless collaboration across borders, and innovative technology like AI driving smarter processes.
Yet, with this digital migration comes a significant increase in risks. In 2024, over 40 billion electronic records are projected to be stolen, signalling the growing scale of cyber threats and the pressing need for comprehensive information management and data security measures. A staggering 71% of UK businesses have experienced some form of cybercrime, with the costs being both financial and reputational. Consider the disruption caused by recent cyber-attacks on Synnovis, the UK’s leading blood test provider, which led to thousands of cancelled operations. While the financial toll was severe, the real impact was on medical treatments – lives were disrupted across the country.
The Two-Fold Challenge
The first part of the challenge lies in outdated technology. Many breaches occur because organisations rely on legacy IT systems – systems built in an era where cybersecurity wasn’t even a consideration. Upgrading these systems is no easy task, but it’s crucial for building a more secure digital foundation.
However, there’s another key issue: organisations often undervalue the importance of proactive security – especially if they haven’t yet experienced a breach. If you haven’t felt the pain of a security incident, it’s easy to overlook the very measures that keep your systems safe. Unfortunately, when breaches do occur, the consequences ripple through supply chains, affecting clients and suppliers alike.
The Human Element: Our Greatest Weakness
The greatest risk isn’t always technology – it’s the human-shaped gaps in the system. Many security breaches happen at the most basic level: weak password management, unsecured networks, or simply misplacing devices that aren’t properly protected. Despite best practices being widely known, people still write passwords on post-it notes, use the same password for years, or connect to unsecured Wi-Fi networks. Shockingly, 51% of people don’t trust password managers, and 39% have been using the same password for over three years.
The Way Forward: Addressing Both Tech and Human Behaviour
Any robust solution must address both the technical and human aspects of security. It’s about convincing organisations – and individuals – of the value of what hasn’t been lost yet. The real triumph is in preventing breaches before they happen, through secure systems and comprehensive information strategies.
At the heart of this strategy is data management. By only digitising legacy content that’s needed, implementing appropriate retention rules, and conducting regular audits, businesses can ensure that they are not only secure but also efficient. Storing excess, outdated information only adds to the risk. The key lies in streamlined, secure information management practices that reduce vulnerabilities and enhance control over critical information.
In a world where the threats are constantly evolving, it’s time to ask: is your information management strategy keeping you as safe as it could be?