Click me

The Snowden Effect for Business Is your data safe? Your company might protect from external threats, but internal threats can be even more prevalent.. 63% Almost two-thirds of data breaches come from internal sources. Whether it is from lack of control, errors, or fraud, the biggest threat to your company's data is from within. $143 Billion Dollars That number should get your attention, it's how much was lost in 2013 due to data theft. Here is how... 740,000,000 $194 49 to 80 days Records were exposed due to The average cost of a data The amount of time it usually data theft and internal attacks in breach per compromised record. 2 takes to discover a breach 2013. 1 occurred. 2 Everyday Mistakes Once an employee has access to sensitive documents and data, they have a variety of ways to insecurely transfer (and expose) it. 62% Use a remote storage device (USB, Phone) to transfer. 3 54% Use a personal email to transfer. 3 39% Use a consumer sites (Dropbox, Box, Hightail, etc.) to transfer. 3 Stolen Documents Exiting and former employees pose a great risk to data being taken from your company. 45% Stole non-financial business documents and information. 4 39% Stole customer documents and information. 4 16% Stole financial company documents and information. 4 Do You Know Your Employees? Take a look around you and take into account these percentages... 78% 60% Of organizations have experienced a data breach as a result of negligent or malicious employees or other Of employees who quit a job or are asked to leave have stolen company data. 4 insiders. 5 40% 46% Of all cases of data loss bigger than 1,000 confidential Of employees agree that it would be easy to take sensitive business documents customer records, the root cause was a negligent or careless employee.7 to another employer. 6 IT Perspective There are certain practices and technologies companies and IT managers try to put in place to help deter any data security incidents..but it doesn't always happen. 47% 50% 81% of companies believe they have already been compromised; with another 5% saying they operate under the assumption that, if they have not already, will eventually be. of IT departments say their company does NOT have meaningful operational metrics to measure and respond to data and security incidents. 9 of IT departments believe that IF the right investments in technology were in place their companies would be better able to mitigate future internal security breaches. 80% Four out of five IT professionals agree that audit trails and analysis software is the most effective approach for detecting security incidents and breaches. 9 For More Information and HELLO a FREE T-SHIRT Erd Stadan To get more statistics, information, and solutions to keeping your company data safe from internal threats, visit ROT SECURE And see if you qualify for a free t-shirt! Why Snowden? takes no stance for or against Edward Snowden and his actions. We are enforcing the fact that Edward took documents from his employer without their knowledge. This is a common occurrence in business today that we want to bring light to. Edward just happens to be the poster-child for this subject. Sources 1. 2014 Data Protection and Breach Readiness Guide (Online Trust Alliance) 2. The Post Breach Boom (Ponemon) 3. Dangerous File-Sharing (GlobalSCAPE) 4. Data Theft Common By Departing Employees (Washington Post) 5. The Human Factor in Data Protection (Ponemon) 6. Survey Says: Employees Go Rogue for File-Sharing Needs (Egnyte) 7. Should Companies Allow Employees to Use Consumer File-Sharing Services? (Wall Street Journal) 8. New IT Security Survey Reveals Nearly Half of Companies Assume They Have Been Compromised (CNBC) 9. Cyber Security Incident Response: Are we as prepared as we think? (Ponemon) @lsYourDataSafe Copyright © 2014 IS YOUR DATA SAFE COM * AGENCY

The Snowden Effect for Business

shared by SmartFIle on Apr 08
0 share
Do you know that the biggest threat to sensitive business data is internal and not external? That's right, employees (like Edward Snowden) steal and leak data more often than you think. Learn more a...




Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy


Click the code to copy
Customize size