{"id":3448,"date":"2025-06-05T10:40:31","date_gmt":"2025-06-05T10:40:31","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=3448"},"modified":"2025-06-05T10:40:31","modified_gmt":"2025-06-05T10:40:31","slug":"data-hoarding-can-have-financial-and-security-consequences","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=3448","title":{"rendered":"Data hoarding can have financial and security consequences"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>End-of-life data management, be it deletion of what is no longer required, or data removal from hardware before it\u2019s decommissioned, may not get the attention that data loss through breaches generates, but it\u2019s equally critical \u2014 and equally dangerous, with almost half of enterprises failing to destroy data they no longer need, according to a new survey.<\/p>\n<p>In its 2025 State of Data Sanitization Report, released on Wednesday, data erasure specialist Blancco revealed that companies globally are being driven to react to these risks by pressures around data security (especially with the advent of AI), regulatory compliance, and sustainability.<\/p>\n<p>While 86% of enterprises have suffered a data breach in the last three years, 73% have experienced a data leak, typically caused by process failure or human error, according to the survey of 2,000 cybersecurity, IT, and sustainability leaders at large enterprises around the world.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>End-of-life data management, be it deletion of what is no longer required, or data removal from hardware before it\u2019s decommissioned, may not get the attention that data loss through breaches generates, but it\u2019s equally critical \u2014 and equally dangerous, with almost half of enterprises failing to destroy data they no longer need, according to a [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":3449,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-3448","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/3448"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3448"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/3448\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/3449"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}