Download - Infographic: Content Security and Control
54%
445+30+15+5+5=
10+90+K
90%75%
52%
68%
TYPE OF DATA EXPOSED
¢ CUSTOMER RECORDS (89%)
¢ TRADE SECRETS (6%)
¢ ELECTRONIC-PROTECTED HEALTH INFORMATION (3%)
¢ BUSINESS FINANCIAL ACCOUNT NUMBERS (1%)
¢ AUTHENTICATION CREDENTIALS (1%)
of insiders who stole material from their employers had authorizedaccess to thatmaterial
of organizations say employees frequently or very frequently attach and send confidential documents in clear text using web-based email accounts
Trade secrets were stolen in
of insider theft cases
The majority of insider IP
thieves used a network —
email, a remote network
access channel or
network file transfer
to remove the
stolen data
56%
56%
56%
Among a sa
mpl
e of
eig
hty
new
v
iruses studied in mid-2012 …
8040
LEADING ANTIVIRUS VENDORS
NONE WERE DETECTED BY
81+19+P19%
GETSMISSEDBY AV
of exploits blocked in 2012 used Java vulnerabilities
increase in email-based attacks in first half of 2012
Interception of executable files
via email has
almost doubled
every year since2008
of malware attacks via email
used a link to a webpage
In 2012, there were 91.9 MILLION URLS serving malicious code
39%
of allmalware
Among IT pros at organizations with 1,000 or more email users, more than half believe their organizations were targeted by a spear phishing attack
of o
rgan
izat
ions experienced the loss of sensitive or con
f den
tial docum
ents during the past year
THINGS LOST DUE TO INADEQUATE IT SECURITY
Top secret oil drilling maps
Secure card key technology details
Multi-billion dollaracquisition deals
Designs for the US Joint Strike Fighter
SOURCES: www.itbusinessedge.com/blogs/data-security/good-phishing-techniques-continue-to-penetrate-in-corporate-networks.html;
http://cnsnews.com/news/article/chinese-hackers-stole-plans-americas-new-joint-strike-fighter-plane-says-investigations;
Trustwave Global Security report; www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/;
http://secanalysis.com/a-smattering-of-security-statistics/; www.indefenseofdata.com/data-breach-trends-stats/
www.messagingnews.com/story/are-larger-organizations-more-susceptible-spear-phishing-attacks;
www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/;
www.informationweek.com/security/attacks/rsa-breach-eight-months-later/231903048;
www.bloomberg.com/news/2012-11-04/coke-hacked-and-doesn-t-tell.html;
www.watchdox.com/doc?a=ov&c=aUPPLaBSELn4KEC5R8bbc0Q; www.trustwave.com