infographic: content security and control

1
54% ƽ>/55= * ZK 90% 75% 52% 68% TYPE OF DATA EXPOSED ¢ CUSTOMER RECORDS (89%) ¢ TRADE SECRETS (6%) ¢ ELECTRONIC-PROTECTED HEALTH INFORMATION (3%) ¢ BUSINESS FINANCIAL ACCOUNT NUMBERS (1%) ¢ AUTHENTICATION CREDENTIALS (1%) of insiders who stole material from their employers had authorized access to that material of organizations say employees frequently or very frequently attach and send confidential documents in clear text using web-based email accounts Trade secrets were stolen in of insider theft cases The majority of insider IP thieves used a network — email, a remote network access channel or network file transfer to remove the stolen data 56% 56% 56% A m o n g a s am p l e o f e i g h t y n e w v i r u s e s s t u d i e d i n m i d - 2 0 1 2 80 40 LEADING ANTIVIRUS VENDORS NONE WERE DETECTED BY Q3P 19% GETS MISSED BY AV of exploits blocked in 2012 used Java vulnerabilities increase in email- based attacks in first half of 2012 Interception of executable files via email has almost doubled every year since 2008 of malware attacks via email used a link to a webpage In 2012, there were 91.9 MILLION URLS serving malicious code 39% of all malware Among IT pros at organizations with 1,000 or more email users, more than half believe their organizations were targeted by a spear phishing attack o f o r g a n i za t i o ns e x p e r i e n c e d t h e l o s s o f s e n s i t i v e o r c o n f d e n t i a l d o c u me nt s d u r i n g t h e p a s t y e a r THINGS LOST DUE TO INADEQUATE IT SECURITY Top secret oil drilling maps Secure card key technology details Multi-billion dollar acquisition deals Designs for the US Joint Strike Fighter SOURCES: www.itbusinessedge.com/blogs/data-security/good-phishing-techniques-continue-to-penetrate-in-corporate-networks.html; http://cnsnews.com/news/article/chinese-hackers-stole-plans-americas-new-joint-strike-fighter-plane-says-investigations; Trustwave Global Security report; www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/; http://secanalysis.com/a-smattering-of-security-statistics/; www.indefenseofdata.com/data-breach-trends-stats/ www.messagingnews.com/story/are-larger-organizations-more-susceptible-spear-phishing-attacks; www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/; www.informationweek.com/security/attacks/rsa-breach-eight-months-later/231903048; www.bloomberg.com/news/2012-11-04/coke-hacked-and-doesn-t-tell.html; www.watchdox.com/doc?a=ov&c=aUPPLaBSELn4KEC5R8bbc0Q; www.trustwave.com

Upload: trustwave

Post on 18-Nov-2014

264 views

Category:

Technology


1 download

DESCRIPTION

During the past year, 90% of organizations experienced the loss of sensitive or confidential documents, whether through a breach, or through a compromised or careless employee. And customer records made up 98% of the data exposed - everything from credit card numbers to personally identifiable information. Do you have data worth stealing? Check out this new infographic and find out why it’s so important to secure and control your sensitive data – like we say here at Trustwave, it’s all about keeping the bad stuff out and keeping the good stuff in.

TRANSCRIPT

Page 1: Infographic: Content Security and Control

54%

445+30+15+5+5=

10+90+K

90%75%

52%

68%

TYPE OF DATA EXPOSED

¢ CUSTOMER RECORDS (89%)

¢ TRADE SECRETS (6%)

¢ ELECTRONIC-PROTECTED HEALTH INFORMATION (3%)

¢ BUSINESS FINANCIAL ACCOUNT NUMBERS (1%)

¢ AUTHENTICATION CREDENTIALS (1%)

of insiders who stole material from their employers had authorizedaccess to thatmaterial

of organizations say employees frequently or very frequently attach and send confidential documents in clear text using web-based email accounts

Trade secrets were stolen in

of insider theft cases

The majority of insider IP

thieves used a network —

email, a remote network

access channel or

network file transfer

to remove the

stolen data

56%

56%

56%

Among a sa

mpl

e of

eig

hty

new

v

iruses studied in mid-2012 …

8040

LEADING ANTIVIRUS VENDORS

NONE WERE DETECTED BY

81+19+P19%

GETSMISSEDBY AV

of exploits blocked in 2012 used Java vulnerabilities

increase in email-based attacks in first half of 2012

Interception of executable files

via email has

almost doubled

every year since2008

of malware attacks via email

used a link to a webpage

In 2012, there were 91.9 MILLION URLS serving malicious code

39%

of allmalware

Among IT pros at organizations with 1,000 or more email users, more than half believe their organizations were targeted by a spear phishing attack

of o

rgan

izat

ions experienced the loss of sensitive or con

f den

tial docum

ents during the past year

THINGS LOST DUE TO INADEQUATE IT SECURITY

Top secret oil drilling maps

Secure card key technology details

Multi-billion dollaracquisition deals

Designs for the US Joint Strike Fighter

SOURCES: www.itbusinessedge.com/blogs/data-security/good-phishing-techniques-continue-to-penetrate-in-corporate-networks.html;

http://cnsnews.com/news/article/chinese-hackers-stole-plans-americas-new-joint-strike-fighter-plane-says-investigations;

Trustwave Global Security report; www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/;

http://secanalysis.com/a-smattering-of-security-statistics/; www.indefenseofdata.com/data-breach-trends-stats/

www.messagingnews.com/story/are-larger-organizations-more-susceptible-spear-phishing-attacks;

www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/;

www.informationweek.com/security/attacks/rsa-breach-eight-months-later/231903048;

www.bloomberg.com/news/2012-11-04/coke-hacked-and-doesn-t-tell.html;

www.watchdox.com/doc?a=ov&c=aUPPLaBSELn4KEC5R8bbc0Q; www.trustwave.com