Data at Risk: Super Scary Facts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Data at Risk: Super Scary Facts-7 Next

Every year, 1.3 million devices are stolen. Every 3.5 seconds, someone in America loses a cell phone, and phone theft has risen over 40 percent since 2007. These numbers are particularly terrifying given that 65 percent of companies are not able to remotely wipe devices, and 43 percent of mobile devices are not even password protected. The use of encryption could be a last-stand measure against a breach, but 76 percent of companies do not encrypt mobile devices carrying their data.

Organizations put a lot of effort into keeping data within their networks safe, using any of a number of endpoint protection systems and monitoring tools. Unfortunately, once outside the safety of the corporate firewall, corporate data is exposed to threats both seen and unseen. Today's workforce is on the move, working from remote locations almost as much as from a stationary office. To accommodate this fluidity of workplace, mobile devices are now carrying more sensitive corporate data than ever before, making them a prime access point for potential data breaches.  

While organizations have been grappling with the complexities of BYOD, there's definitely plenty of room for improvement. The facts highlighted in this slideshow, provided by Druva, aren't for the faint of heart, so leave a light on while you learn about the dangers faced by data in the wild. And turning a blind eye won't make them go away.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.