Data at Risk: Super Scary Facts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Data at Risk: Super Scary Facts-9 Next

When it comes to an audit, most organizations would be up a creek without a paddle. Seventy-two percent of IT pros say it's difficult to detect whether employees are using insecure endpoint devices, and only 28 percent of CIOs believe their mobile security policies would satisfy an auditor. Forty percent of IT pros can't determine their organization's compliance with employee access and use of regulated data on endpoint devices. Only 51 percent of companies are confident they can preserve data on mobile devices for litigation, regulator or investigative requirements.

Organizations put a lot of effort into keeping data within their networks safe, using any of a number of endpoint protection systems and monitoring tools. Unfortunately, once outside the safety of the corporate firewall, corporate data is exposed to threats both seen and unseen. Today's workforce is on the move, working from remote locations almost as much as from a stationary office. To accommodate this fluidity of workplace, mobile devices are now carrying more sensitive corporate data than ever before, making them a prime access point for potential data breaches.  

While organizations have been grappling with the complexities of BYOD, there's definitely plenty of room for improvement. The facts highlighted in this slideshow, provided by Druva, aren't for the faint of heart, so leave a light on while you learn about the dangers faced by data in the wild. And turning a blind eye won't make them go away.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.