Seven Data and Information Security Mistakes Even Smart Companies Make

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven Data and Information Security Mistakes Even Smart Companies Make-2 Next

Securing Only Networks

Securing networks is always a good idea, but endpoints are every bit as critical, particularly since many breaches occur due to human error (downloading malware along with that PowerPoint) or disgruntled employees. Anything connected to the network can be used to bring it down, including testing facilities, end-user PCs and mobile devices, says Artem Metla, OSCP (Offensive Security Certified Professional), security QA engineer at Ciklum. One successful attack can give someone with less-than-honorable intentions the credentials to acquire administrator permissions.

Even smart companies can make data and information security mistakes. Over the past few years, the mistake-prone have included the largest banks, entertainment companies and health care providers. Even law firms are now vulnerable. And it's not always lack of resources that leads to vulnerability, although for some that's an issue - it's often about common traps that are easily avoidable.

In 2014, the average cost of a data breach to a company was $3.5 million, according to the Ponemon Institute. And some put the costs of Sony's well-publicized breach in excess of $35 million. The impacts are not trivial, but companies can take steps now to reduce their exposure. In this slideshow, Digital Guardian has identified seven mistakes that even smart companies make, according to some top data security experts, and what you can learn from them.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.