2. Ponemon Institute, 2015 Security Breaches Study; Ponemon Institute, 2013 Confidential Documents at Risk Study
Security is a Top Initiative to Protect
from External Attacks
Top data security breaches:
• 39% business information
• 27% customer information
• 14% intellectual property
• 10% employee information
0% 10% 20% 30% 40% 50%
Cloud Computing
Business Intelligence
Security
Mobility
% of respondents
75%
Number of Companies Reporting a
Data Security Breach
Top Areas of Focus for
IT Professionals in 2015
3. Security is a Top Initiative to Protect
from Internal Risks
Feel that their organization
is exposed to considerable
risk due to stored content
that is not correctly
identified
Of U.S. organizations
experienced leakage or loss
of sensitive or confidential
documents
AIIM Industry Watch Content Analytics , July 2015; IDC InfoBrief: The Document Disconnect, 2015
54% 90%
.
76%
Say document process
issues impact revenue
recognition or create
auditor issues
4. Are Your Document Workflows
Creating Risk for Your Company?
• Paper creates risk
• Free conversion sites create risk
• Ad-hoc sharing creates risk
• Lack of visibility and traceability creates risk
5. Old Paper Habits Die Hard—Or Not at All
58%
Default to printing
and signing a
document received
via email
27%
Print PDF documents
in order to review
them
“The State of Document Productivity in the Workplace.” Nitro, 2014
6. Old Paper Habits Create Risk
• Paper is at the heart of a
significant percentage of
security breaches
• Paper is too easy to destroy.
• Paper is impossible to track,
version, or protect.
23%
61%
Of major breaches (affecting
more than 500 individuals)
involve paper records
61% of small breaches involve
paper records
Ponemon Institute, 2013 Confidential Documents at Risk Study
7. Unvetted PDF Conversion Sites
Create Risk
• Are your employees searching
for Free PDF Conversion tools
and loading their documents
onto the internet?
• How much can you trust these
sites with your sensitive and
confidential company,
customer, and employee
information?
Vilnius, Lithuania?
8. Ad-hoc Sharing Creates Risk
Ponemon Institute, 2012 Security Breaches Study
77% do not provide secure
document sharing/mobile access
solutions for their employees
85% use insecure file sharing tools
such as DropBox, Box.net, USB
drives, email attachments
Public Drives USB Drives Email Attachments
62% 68% 71%
Most Common Methods of Theft or Loss
9. Lack of Visibility and Traceability
Create Risk
IDC InfoBrief: The Document Disconnect, 2015
55%
Can’t tell whether a document has been
viewed/reviewed/signed by appropriate
people and cite difficulty getting status
and visibility into the process
38%
Cite difficulty relating documents or
versions of documents into important
context
10. Business Leaders See Upside Potential
in Improving Document Security
IDC InfoBrief: The Document Disconnect, 2015
Execs and managers in sales, HR, procurement, legal,
and other departments estimate that fixing the
‘document disconnect’ will significantly reduce risk.
23%
Risk Reduction
11. 4 Things You Can Start Doing Today
Provide workers access to the right tools
Eliminate paper wherever possible
Prescribe standardized collaboration practices
Investigate a Smart Documents Platform
12. Thank you!
Please contact us for further information, or to
learn how Nitro can help your organization.
Visit our Website: www.GoNitro.com
Visit our Blog: blog.gonitro.com
Follow us on Twitter: @NitroHQ