Top 5 Places Your Enterprise Data Is at Risk

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Top 5 Places Your Enterprise Data Is at Risk-4 Next

Mobile Devices

Every minute, 113 cell phones are lost or stolen in the U.S., but only an estimated 46 percent of enterprises require a password for mobile devices, leaving over half of the mobile workforce vulnerable. With mobile devices becoming more popular within enterprises, it's not surprising that lost devices were responsible for nearly 41 percent of data breaches reported between 2005 and 2015.

The security of smartphones, laptops and tablets is up to both enterprises and their users. If mobile devices are accepted at the workplace, it's essential for IT departments to require the basics, such as using passwords and collaborating via secure tools. But at the end of the day, human error presents a weak link in the security chain, and administrators need to anticipate security-related incidents, both malicious and accidental. As such, enterprises must require data-level security assurances that go beyond the capabilities of MDM technologies, securing not just the device, but the data itself.

With an increase in cyber attacks targeting financial data, health care records, HR files, intellectual property and other forms of highly sensitive data, enterprises must evaluate not only what data is at risk, but where data is at risk. The threat perimeter has expanded well beyond the walls of most organizations as more file sharing, mobile devices and cloud technologies are deployed by IT departments.

Knowing where data resides is the first step in securing the enterprises' new perimeter. However, the battle isn't won until security controls are in place, regardless of a file's location.

In this slideshow, Seclore breaks down the top five areas exposing your sensitive data to risk, and provides tips for minimizing security vulnerabilities.

The top five areas exposing your sensitive data to risk and tips for minimizing security vulnerabilities.

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.