Transcript
Page 1: Infographic: Content Security and Control

54%

445+30+15+5+5=

10+90+K

90%75%

52%

68%

TYPE OF DATA EXPOSED

¢ CUSTOMER RECORDS (89%)

¢ TRADE SECRETS (6%)

¢ ELECTRONIC-PROTECTED HEALTH INFORMATION (3%)

¢ BUSINESS FINANCIAL ACCOUNT NUMBERS (1%)

¢ AUTHENTICATION CREDENTIALS (1%)

of insiders who stole material from their employers had authorizedaccess to thatmaterial

of organizations say employees frequently or very frequently attach and send confidential documents in clear text using web-based email accounts

Trade secrets were stolen in

of insider theft cases

The majority of insider IP

thieves used a network —

email, a remote network

access channel or

network file transfer

to remove the

stolen data

56%

56%

56%

Among a sa

mpl

e of

eig

hty

new

v

iruses studied in mid-2012 …

8040

LEADING ANTIVIRUS VENDORS

NONE WERE DETECTED BY

81+19+P19%

GETSMISSEDBY AV

of exploits blocked in 2012 used Java vulnerabilities

increase in email-based attacks in first half of 2012

Interception of executable files

via email has

almost doubled

every year since2008

of malware attacks via email

used a link to a webpage

In 2012, there were 91.9 MILLION URLS serving malicious code

39%

of allmalware

Among IT pros at organizations with 1,000 or more email users, more than half believe their organizations were targeted by a spear phishing attack

of o

rgan

izat

ions experienced the loss of sensitive or con

f den

tial docum

ents during the past year

THINGS LOST DUE TO INADEQUATE IT SECURITY

Top secret oil drilling maps

Secure card key technology details

Multi-billion dollaracquisition deals

Designs for the US Joint Strike Fighter

SOURCES: www.itbusinessedge.com/blogs/data-security/good-phishing-techniques-continue-to-penetrate-in-corporate-networks.html;

http://cnsnews.com/news/article/chinese-hackers-stole-plans-americas-new-joint-strike-fighter-plane-says-investigations;

Trustwave Global Security report; www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/;

http://secanalysis.com/a-smattering-of-security-statistics/; www.indefenseofdata.com/data-breach-trends-stats/

www.messagingnews.com/story/are-larger-organizations-more-susceptible-spear-phishing-attacks;

www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/;

www.informationweek.com/security/attacks/rsa-breach-eight-months-later/231903048;

www.bloomberg.com/news/2012-11-04/coke-hacked-and-doesn-t-tell.html;

www.watchdox.com/doc?a=ov&c=aUPPLaBSELn4KEC5R8bbc0Q; www.trustwave.com

Top Related