Seven Data and Information Security Mistakes Even Smart Companies Make

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven Data and Information Security Mistakes Even Smart Companies Make-3 Next

Not Aligning Security with Business Goals

Security projects cannot exist in silos; they need to match up with their overall impact on business goals and revenue, according to Kevin West, CEO of K logix. Security teams miss out on funding because their projects are just seen as an operational expense, not a business enabler. When this happens, data security overall is less effective, since no one except the security team knows why the project is important. Another critical component of getting the whole company aligned with security initiatives is user training. Given the popularity of phishing attacks and other social engineering tactics, employees must receive effective and ongoing training on secure user behavior.

Even smart companies can make data and information security mistakes. Over the past few years, the mistake-prone have included the largest banks, entertainment companies and health care providers. Even law firms are now vulnerable. And it's not always lack of resources that leads to vulnerability, although for some that's an issue - it's often about common traps that are easily avoidable.

In 2014, the average cost of a data breach to a company was $3.5 million, according to the Ponemon Institute. And some put the costs of Sony's well-publicized breach in excess of $35 million. The impacts are not trivial, but companies can take steps now to reduce their exposure. In this slideshow, Digital Guardian has identified seven mistakes that even smart companies make, according to some top data security experts, and what you can learn from them.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.