According to a recent Thales survey of 4,000 business and IT managers, 82 percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud. However, nearly 40 percent admitted their “security posture” has been reduced as a result, and nearly two thirds of those polled are depending on their service providers to protect their data. Notes Richard Moulds, vice president/Strategy at Thales e-Security, “Effective key management is emblematic of control and the need for centralized and automated key management integrated with existing IT business processes is a necessity. Even if you allow your data to be encrypted in the cloud, it’s important to know you can still keep control of your keys. If you control the keys, you control the data”…A National Telecommunications Cooperative Association poll found that 87 percent of rural local exchange carriers offer their wireless customers caller ID; 84 percent offer voice mail; 77 percent offer unlimited local calling, family plans and text messaging; 74 percent offer free long distance and Internet access; and 68 percent three-way calling and email – as of 2011. During the next 12-18 months, survey respondents said they will begin offering their wireless subs fixed and mobile data, VoIP, WiMAX and 700 MHz service.