Click me
Transcribed

The State of Data Security in Today's Borderless Enterprise

DATA SECURITY THE BORDERLESS ENTERPRISE MOBILE SOCIAL CLOUD THE TRADITIONAL ENTERPRISE PERIMETER HAS DISSOLVED- companies now face the task of securing highly virtualized IT environments, and conventional security defenses were not designed to deal with threats associated with mobile, social and cloud computing. CYBER ENTERPRISES ARE UNDER ATTACK. WAR The current threat landscape is full of viruses, worms, trojans, spyware, botnets and phishing campaigns designed to steal everything from military defense plans to = schematics for toys.com STARTLING BREACH STATISTICS According to Verizon's 2013 Data Breach Investigations study of more than 47,000 REPORTED SECURÍTY INCIDENTS AND 621 CONFIRMED DATA BREACHES, 92% OF THE ATTACKS WERE PERPETRATED BY OUTSIDERS, AND 66% TOOK MONTHS OR MORE TO DISCOVER. 69% WERE DISCOVERED BY A THIRD PARTY, LIKE THE FBI. 9% WERE DISCOVERED BY CUSTOMERS. MALWARE ON THE RISE McAfee Labs researchers now catalog 100,000 new malware samples each day that's 69 new pieces of malware a minute. And the number of mobile malware samples discovered in 2012 was 44 times higher than the previous year. *..... SYMANTEC'S LOST CELL PHONE STUDY CONFIRMS THE WORST IN PEOPLE A new study by security firm Symantec seems to confirm the worst in people, revealing that PEOPLE WHO FOUND A LOST SMARTPHONE VIOLATED THE OWNER'S PRIVACY A WHOPPING 89% OF THE TIME. 89% 83% 57% of devices were accessed for Personal of devices were accessed for Corporate Related Apps and of devices were accessed for Related Apps and Information Saved Passwords Information Information COMBATING APT ADVANCED PERSISTENT THREATS 1 KNOW WHAT TO PROTECT: Identify critical information assets 01 CLASSIFY DATA: Separate valuable information from less valuable information ASSESS YOUR SECURITY POSTURE: Cut out low-hanging vulnerabilities 4 ENHANCE DETECTION CAPABILITIES : Go beyond traditional controls ENSURE SECURITY AWARENESS AND TRAINING: People are easier targets than systems PUT A COMPREHENSIVE INCIDENT RESPONSE PLAN IN PLACE: Shift your focus from prevention to detection and response SOURCES: http://hackmageddon.com/2013/02/14/advanced-persistent-threats-are-among-us-survey-reveals/ http://www.mcafee.com/us/security-awareness/articles/state-of-malware-2013.aspx http://www.verizonenterprise.com/DBIR/2013/?gclid=CIDsv4mny7cCFYii4Aod66wAWA http://www.symantec.com/content/en/us/about/presskits/b-symantec-smartphone-honey-stick-project http://focus.forsythe.com/articles/268/Combating-Advanced-Persistent-Threats From the Editors of Forsythe FOCUS Magazine http://focus.forsythe.com

The State of Data Security in Today's Borderless Enterprise

shared by mattroyse on Jul 02
232 views
1 share
0 comments
What modern enterprises should know about keeping their data safe.

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size