Spear Phishing, Targeted Attacks and Data Breach Trends

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Spear Phishing, Targeted Attacks and Data Breach Trends-6 Next

Respondents were also asked, “In the past year, was your organization the victim of a data breach? (i.e., was confidential or proprietary information about - or belonging to - your orga­nization improperly exposed?).” Overall, 19 percent (18 percent RSA, 23 percent Infosecurity) of respondents said that their organization had experienced a data breach in the past year.

This finding was fairly consistent regardless of company size: 21 percent (20 percent RSA, 21 percent Infos­ecurity) of respondents from large organizations (more than 1,000 email users) said their organization experienced a breach, as did 17 percent (15 percent RSA, 24 percent Infosecurity) of respondents from smaller organizations.

Overall, roughly half of respondents (51 percent - 52 percent RSA, 44 percent Infosecurity) said that their or­ganization did not experience a data breach in the past year. A significant number of respon­dents to the survey were unsure whether their organization had suffered a breach or not — the remaining 30 percent (30 percent RSA, 33 percent Infosecurity) reported that they did not know.

During the RSA Conference 2013 and Infosecurity Europe 2013 conferences, Proofpoint surveyed a total of 620 professionals with C-level, IT, security and risk/compliance titles (505 of these at the RSA Conference, 115 at Infosecurity Europe) that visited Proofpoint’s conference booth. Using a Web-based survey, respondents were asked about a variety of concerns around spear phishing, advanced targeted attacks and data breaches. Both surveys asked the same questions. This slideshow features the key findings.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.