Skip to content

Delphix’s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments

Survey respondents also share concerns about data privacy in AI environments, with 68% perceiving a lack of solutions 

A graphic showing security issues and announcing the 2024 State of Data Compliance and Security Report

 

MINNEAPOLIS, August 20, 2024 – Perforce Software, the DevOps company for global teams requiring speed, quality, security, and compliance at scale along the development lifecycle, today announced the findings of the Delphix 2024 State of Data Compliance and Security Report. This inaugural report delivers exclusive research on the challenges of protecting sensitive data in non-production or lower environments, such as development, testing, analytics, and AI/ML. 

“Our goal with this report is to share the realities of sensitive data exposures in non-production to help enterprises better protect their data moving forward,” said Ann Rosen, Director of Product Marketing for Delphix by Perforce. “Protecting sensitive data — data with personal identifiable information (PII) — in non-production has become more important over the years as cyberattacks target these environments. Companies need to do more to protect sensitive data.” 

The report also reveals that the challenge of protecting sensitive data will only get more complex with the rise of AI. 85% of enterprises report concerns about regulatory non-compliance in AI environments. Even more troubling, 68% of organizations surveyed perceive a lack of solutions to tackle data privacy in AI environments.  

“AI is transforming industries, and data is at the heart of AI,” said Rod Cope, Chief Technology Officer of Perforce Software. “When it comes to AI and data, it can be a double-edged sword. There’s a lot of excitement around the innovation possible in AI, but data in AI environments must be protected. The findings in the State of Data Compliance and Security Report underline the importance of complying with data privacy regulations in AI environments, too.” 

Overall, 91% of organizations are concerned about the expanded exposure footprint across all lower environments (including software development, testing, and data analytics). Yet 86% of organizations allow data compliance exceptions in non-production. As a result, 54% of organizations have already experienced a data breach or theft involving sensitive data in non-production environments. In Delphix’s experience, if this data is not protected, the consequences can be dire. Indeed, 53% have already experienced audit issues and failures related to non-production. 

To mitigate these concerns, organizations are turning to tools and approaches like static data masking, cited as a current solution by 66% of organizations surveyed.  

 

“We hear all the time from customers that exceptions are given because it’s too complicated and time-consuming to achieve compliance without slowing down development or impacting quality,” said David Wells, Product Lead of Compliance Products for Delphix by Perforce. “At Delphix and Perforce, we believe that with the right approach, you can achieve compliance rapidly without bottlenecking innovation. Static data masking is the best way to protect your test and development data. You need production-realistic data to detect defects as early as possible in the development lifecycle, but you certainly shouldn’t use production data for this purpose. That’s why we’re continuously evolving Delphix masking solutions to meet the ever-expanding data compliance landscape, regardless of data source or environment.”   

About Delphix by Perforce
Delphix by Perforce powers multicloud data automation and compliance by deploying masked, production-quality data to development, test, and AI/ML environments. Leading companies rely on Delphix to adopt multicloud, create pipelines for data science, automate test data management, and achieve CI/CD while ensuring data privacy and governance.

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

[Security News] Data Breaches from healthcare and engineering industries;OneBlood Bank, Cencora, HealthEquity, and McDowall

1. Pharma Giant Cencora confirmed the theft of personal and health information

Pharmaceutical giant Cencora confirmed that the threat actors had access to personally identifiable information (PII) and protected health information (PHI) following the February 2024 cyberattack. On February 21, Cencora announced a data breach in a filing with the Securities and Exchange Commission (SEC). At the time, the company announced that it was investigating the scope of the security breach to determine the type of data that has been infiltrated. In a new filing with the Securities and Exchange Commission (SEC), the company reported that the amount of exfiltrated data is greater than what was initially identified.

Source : Security AffairsSC MediaInfosecurity Magazine

 

2. Ransomware Attack Hits OneBlood Blood Bank, Disrupts Medical Operations

The organization, which provides blood services to more than 300 hospitals in Florida, Georgia and the Carolinas, said the security breach impacted its software system and slowed down operations. “Manual processes take significantly longer to perform and impact inventory availability. In an effort to further manage the blood supply we have asked the more than 250 hospitals we serve to activate their critical blood shortage protocols and to remain in that status for the time being,” Forbes added. OneBlood said it is working closely with anti-malware specialists and federal, state and local agencies as part of their incident response plan.

Sources: Security WeekSecurity Affairs,  CNNBleeping Computer

 

3. HealthEquity says data breach impacts 4.3 million people

HSA provider HealthEquity has determined that a cybersecurity incident disclosed earlier this month has compromised the information of 4,300,000 people. An investigation determined that the breach occurred on March 9, 2024, but was only verified by the firm on June 26, following an internal investigation. The data that has been exposed as a result of this breach varies per individual and includes: Full names, Home address, Telephone number, Employer and employee ID, Social Security Number (SSN), General dependent information, Payment card information (not numbers).

Source : Bleeping ComputerTech RadarTech Crunch

 

4. McDowall Affleck Confirms ‘Cyber Incident’ After RansomHub Claims Access to 470 GB Data

McDowall Affleck, an Australian engineering firm, has acknowledged being the target of a “cyber incident.” While the company has not identified a specific threat actor, the RansomHub ransomware group claimed responsibility for the McDowall Affleck cyberattack on August 1, 2024. The alleged perpetrator behind the attack, RansomHub, is a notorious ransomware group known for high-profile attacks. Details of the McDowall Affleck cyberattack were shared on a dark web site linked to the threat actor. According to RansomHub’s own communication, the group claims to have accessed 470 GB of McDowall Affleck’s internal data. The leaked information reportedly includes critical documents, insurance records, tender and contract details, and personal information of both employees and clients.

Source : The Cyber ExpressTeissCyber Daily

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Storware Backup and Recovery 7.0 Coming Soon

Big announcement! Storware Backup and Recovery 7.0 is launching soon, bringing a host of new features designed to enhance your data protection strategy.

Here’s a sneak peek of what you can expect:

📈 Broad Platform Compatibility: Support now extends to Debian, Ubuntu, and seamless integration with Canonical OpenStack and KVM.

🔒 Expanded Backup Sources: VergeIO and Proxmox environments with CEPH storage are now supported, ensuring robust and flexible data protection.

☁️ New Storage Options: Back up your data to Impossible Cloud Storage, adding more flexibility to your backup locations.

⚙️ Easy Deployment: Our new ISO-based installation process makes deploying backup and recovery solutions simpler than ever.

🧑‍💻 Enhanced User Experience: The redesigned configuration wizard streamlines the process, making setup quick and easy.

🔍 Advanced Features: Transition to Quarkus server framework for better performance and security, with automated network storage detection for added convenience.

Get ready to experience the future of backup and recovery with Storware 7.0!

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.