Ten Ways the IT Department Enables Cyber Crime - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Ten Ways the IT Department Enables Cyber Crime-3 Next

Your time is valuable. The countless hours we spend creating reports and analyzing data to make solid business decisions, the weekends we spend on email and on presentations, and performing due diligence on business opportunities that are time sensitive; all of these result in massive amounts of data loaded on portable systems.

Yet, IT departments treat a laptop as a glass bottle of Coke. When a device is lost or stolen, the insurance claim only considers the value of the empty bottle, ignoring all the valuable data that was contained within the device.

Because of that, the protection schemes on mobile devices usually address the value of the device, instead of considering the value of the data. The fact is that most often the value of the data on the device exceeds the value of the devices itself, often hundreds of times over. Use of managed anti-malware, anti-theft and privacy technologies for mobile device is a good start to address protecting mobile data.

End-user demands for access to the World Wide Web and all of the communication vehicles that it affords are at an all-time high. Business demands for those same communication vehicles are also on the rise. The mobility of employees and company data present a growing challenge and keeping up with the exponentially growing cyber crime threat is daunting.

As a result, and often without their knowledge or understanding, many IT departments have become accomplices to cyber crime. This slideshow explains the various ways that corporate IT departments are enabling cyber crime in our environments, and provides some guidelines to prevent this dangerous, destructive practice from continuing.

This slideshow features 10 ways that IT departments are enabling cyber criminals today, as identified by Kaspersky Lab experts, and offers ways to stop them.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.