Data at Risk: Super Scary Facts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Data at Risk: Super Scary Facts-4 Next

When you consider how a data breach occurs, your first thought is likely going to be hackers. And they do account for a large percentage of breaches, but nearly 36 percent of all data breaches are caused by inadvertent insider misuse. Even though 77 percent of companies have policies prohibiting the use of free online file-sharing services, 72 percent of employees report using them anyway. The Ponemon Institute also found that only 32 percent of organizations took steps to ensure employees didn't wrongfully transfer or misuse information.

Organizations put a lot of effort into keeping data within their networks safe, using any of a number of endpoint protection systems and monitoring tools. Unfortunately, once outside the safety of the corporate firewall, corporate data is exposed to threats both seen and unseen. Today's workforce is on the move, working from remote locations almost as much as from a stationary office. To accommodate this fluidity of workplace, mobile devices are now carrying more sensitive corporate data than ever before, making them a prime access point for potential data breaches.  

While organizations have been grappling with the complexities of BYOD, there's definitely plenty of room for improvement. The facts highlighted in this slideshow, provided by Druva, aren't for the faint of heart, so leave a light on while you learn about the dangers faced by data in the wild. And turning a blind eye won't make them go away.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.