The Unseen Threat to Enterprise Data Security

Artistic representation for The Unseen Threat to Enterprise Data Security

Enterprises face a myriad of security threats, but perhaps the most overlooked is the risk of data loss through stolen drives and devices. Recent research from Blancco Technology Group reveals that this risk far outweighs that of ransomware or compromised credentials.

The Blancco 2025 State of Data Sanitisation Report

Blancco’s 2025 State of Data Sanitisation Report, based on responses from 2,000 cybersecurity, IT, and sustainability leaders across North America, Europe, and Asia-Pacific, sheds light on the evolving threat landscape. The report highlights the prevalence of data breaches, data leaks, and phishing-related incidents.

  • 86 per cent of surveyed organizations had experienced a data breach in the past three years.
  • 73 per cent had suffered a data leak.
  • Phishing-related incidents remain the most common cause of breaches, but theft of devices or drives containing sensitive data now outpaces both stolen credentials and ransomware.

The AI Double-Edged Sword

AI has both positive and negative impacts on data management. While 25 per cent of respondents say AI has increased the volume of redundant data they holdβ€”and 22 per cent report AI is complicating complianceβ€”more than half are leveraging AI to clarify data retention policies and support sanitization efforts.

Feature Percentage of Respondents
Leaking redundant data due to AI 25%
AI complicating compliance 22%
Leveraging AI for sanitization and retention 51%

Compliance Demands

Compliance demands are driving a surge in investment. Amid an evolving patchwork of national, regional, and sector-specific data protection regulations, over half of organizations are increasing budgets for compliance, with average investment rising by 46%.

Nearly all surveyed companies either have data disposition policies in place (55%) or are in the process of implementing them (42%).

  1. 47 per cent of devices destroyed for data security reasons were still functional.
  2. 25 per cent of refurbished laptops and desktops, and 19 percent of repurposed data center assets, were recycled without certified data erasure.
  3. 17 per cent of breach or leak incidents, data compromise stemmed from redeployed assets containing residual sensitive information.

Unintended Environmental Consequences

The emphasis on compliance is contributing to unintended environmental consequences. Respondents report that up to 47 per cent of devices destroyed for data security reasons were still functional.

This highlights the need for businesses to carefully consider their data disposal processes and ensure that devices are properly erased before recycling or reusing them.

AI can be a powerful tool for simplifying data retention and sanitization, but it’s not without its challenges. To navigate these complexities, organizations must invest in the right tools and strategies to ensure seamless integration with existing security and compliance frameworks.

Conclusion

The threat of data loss through stolen drives and devices is a serious concern for enterprises.

news

news is a contributor at gdprIQ. We are committed to providing well-researched, accurate, and valuable content to our readers.

You May Also Like

Artistic representation for California AB 1355 : Stricter Geolocation Tracking Rules for Bus

California AB 1355 : Stricter Geolocation Tracking Rules for Bus

Here are some key points to consider:Key Provisions of the California Location Privacy ActThe bill would prohibit the collection of...

Artistic representation for Legal Tech Execs Speak On Ai Privacy And Security: Insights From The Legal Industry!

Legal Tech Execs Speak On Ai Privacy And Security: Insights From The Legal Industry!

Understanding the ABA Model Rules of Professional Conduct The American Bar Association (ABA) Model Rules of Professional Conduct are a...

Artistic representation for 4 000 AI Cameras Coming to Rabat : Security Boost or Privacy Threat

4 000 AI Cameras Coming to Rabat : Security Boost or Privacy Threat

The second component involves the implementation of AI and machine learning-based security systems to enhance the safety of citizens and...

Artistic representation for Advanced Data Retention Policies Techniques and Methods

Advanced Data Retention Policies Techniques and Methods

Understanding the Legal Foundations of Data Retention The GDPR mandates that personal data must be collected and processed for specified,...

About news

Expert in general with years of experience helping people achieve their goals.

View all posts by news β†’

Leave a Reply

About | Contact | Privacy Policy | Terms of Service | Disclaimer | Cookie Policy
© 2026 gdprIQ. All rights reserved.