data breach risk brief - 2015

16

Upload: max-risk-intelligence-by-logicnow

Post on 13-Jan-2017

1.743 views

Category:

Data & Analytics


1 download

TRANSCRIPT

700,000 scans of customer servers,

employee desktops and laptops

87%of all desktops

show credit card data being stored

36%of all desktops

show social security numbers

Results revealed a significant amount of data is now in the hands of employees

53% of breaches are caused by employee error or maliciousness(source: BakerHostetler)

How much would employee error or maliciousness cost your company?

95%Of employee computers would cost more than $25,000 if breached.(Source: iScan)

$250k3% of employee computers would cost more than $250,000 if breached.(Source: iScan)

$ 48,843$301,098

Average liability of a:

desktop/laptop

server

$300 millionon an employee computer.

Highest data breach risk liability detected

$400 millionon a server. Actually, we’ve found multiple servers with this much liability.

What Does It Mean for Security Leaders?

If you work for a mid-sized company, for example

1. Recognize that just a handful of employee computers, if breached, would likely cost the company over $2 million.

2. Implement iScan to prioritize the “worst offenders” in terms of liability.

3. Provide employees with iScan security report cards for an easy “to-do” checklist.

4. Present to the Board - in dollars - how the total risk exposure of the organization was just reduced by over $2 million.

Enable the business

Security Team• Financially prioritize risk

for remediation.• Optimize resources by

focusing on highest liability devices first.

The BoardProvide them with security oversight in dollars, the language they understand.

CFO & CRO• Justify resources.• Provide risk metrics.• Prove results

charted over time.

IVY LEAGUE INSTITUTION

“We use iScan to report the financial impact to our Boardroom.

It also empowers our students to self-assess their computers.”

HOTEL(1200 LOCATIONS)

“[I can] walk over to the CFO’s office for the justification of hiring people and procurement of additional products and services to safeguard our data.”

PRESENT THE DOLLAR RISK TO THE BOTTOM LINEEffectively communicate risk in dollars to the Board and CFO

DETECT•Unprotected data• Vulnerabilities• Access permissions

SEE THE SECURITY NUMBERPrioritize the highest risk devices

1 2 3

Real-time, agentless intelligence

Scan liability data is a proprietary calculation of the cost of a breach.

Real-time sensitive data, vulnerabilities and access permissions are weighted by an industry-standard cost.

Dollars automatically calculated

Also see the article in the Washington Times http://bit.ly/1Mu0oBM

Find the power of a Security Number with a free trial

https://app.iscanonline.com/users/sign_up