Five Digitally Vulnerable Areas Your Business May Be Overlooking

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for five commonly overlooked digital devices that could leave organizations open to a data breach, as identified by Cintas Corporation and the Ponemon Institute.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

According to a recent study by the Ponemon Institute – the pre-eminent research center dedicated to privacy, data protection and information security policy – data breaches cost U.S. enterprises an average of $5.4 million per incident in 2012. Cintas Corporation partnered with the Ponemon Institute to identify five digital devices that are overlooked areas in a business and could be subject to a security breach.


"With the growing number of digital devices in today's businesses, it is no longer sufficient to only secure data stored on documents or in computer files," said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. "Data stored on digital devices such as fax machines and routers must be securely destroyed to prevent it from getting into the wrong hands."

This slideshow features the most commonly overlooked digital devices that could be a point of access for a security breach.

 

More Slideshows

Security45-290x195 Cyber Crime: Law Enforcement Fights Back

While cyber crime continued to dominate headlines and wreak havoc on organizations of all sizes across nearly every industry in the first half of 2014, it's refreshing to note law enforcement also stepped it up. ...  More >>

Security44-290x195 August Patch Tuesday: IE Vulnerabilities and Enforcement of 8.1 Update

The patches released by Microsoft for the August Patch Tuesday include nine bulletins (two critical and seven important) and cover 38 CVEs. ...  More >>

Security43-290x195 Five Steps to Protect Your Passwords Before It's Too Late

Here are five steps organizations and individual users should take now to protect their most sensitive password-protected information. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.