IS YOUR BUSINESS AT RISK OF LOSING DATA? 5 . - Trend Micro

3y ago
25 Views
2 Downloads
1.63 MB
9 Pages
Last View : 8d ago
Last Download : 3m ago
Upload by : Aiyana Dorn
Transcription

APrimerIS YOUR BUSINESS AT RISK OF LOSING DATA?5 DATA SECURITY RISKSEVERY SMALL BUSINESSSHOULD KNOW ABOUT

Companies, regardless of size, rely on critical business datain order to succeed and flourish. What would happen to theirbusiness if they lost sensitive information?Source: Ponemon Institute, 2012Based on a Trend Micro-sponsored Ponemon Institute study,more than 78% of organizations have suffered from at leastone data breach over the past two years.1 Regardless ofwho’s responsible for the loss of data—negligent employeesor other insiders, or those with malicious intent—unlessan organization has the necessary knowledge and skills toprotect and recover lost data, data breaches will continue tobe a problem.PERCENTAGE OF ORGANIZATIONS THAT SUFFERED FROM DATABREACHESOrganizations may face insurmountable financial liabilitiesif they lose sensitive data. Data breaches can result indirect costs such as reimbursement to customers anddata recovery costs. Companies may, for instance, facethe inevitable task of recreating lost data from scratchafter a breach occurs. Even worse is the damage toone’s reputation, especially since most consumers—theircustomers—said they would entirely stop dealing with anorganization in the event of a security breach.2In line with the data threats small and medium-sizedbusinesses (SMBs) face, we’ve come up with five reasonswhy an organization may be on the brink of a data g.rsys1.net/responsysimages/trm/ RS CP /TrendMicro rpt the-human-factor-in-data-protection analystponemon.pdf2 -133063783.html

Data Security ThreatsEvery Small BusinessShould Know AboutEmployee negligence puts an organizationat risk.A company’s greatest asset—its employees—can also be its weakest link, especially inan era wherein mobility and accessibilityplay a huge role in enhancingproductivity.77%The top reasons cited for data lossof employees leave theirwere SMB employees’ tendency toopen attachments to or click linkscomputers unattended.embedded in spam, to leave theirsystems unattended, to not frequentlychange their passwords, and to visitrestricted sites. This negligence putscritical business data at risk from datastealing cybercriminals and malicious insiders.Especially since 3.5 new threats are created every second,3 the numberof court cases where SMBs have had six-figure amounts stolen bycybercriminals from their bank accounts has risen. Based on estimates,cybercriminals steal as much as US 1 billion a year from SMBs in theUnited States and Europe alone.43 curity-intelligence/reports/rpt a-lookback-at-2011 information-is-currency.pdf4 online-criminals/article/214333/

SMBs aren’t protected enough.The majority of SMBs said that, in general,they can’t do enough to protect their datausing the measures and technologiesthey currently implement.Most SMBs also doubt theirorganizations’ capability to thwartadvanced persistent threats (APTs)or hack attacks,5 especially sincedetection or discovery of databreaches among SMBs mostly occursaccidentally.65%of SMBs said that,in general, theirorganizations’ sensitiveor confidential businessinformation is notencrypted or safeguardedby DLP technologies.Companies are no longer just at risk of losingdata due to external threats such as hacking and compromises. Theyare, in fact, in even graver danger due to employee negligence ormaliciousness. Even worse, 64% agree that their organizations need torearchitect their security infrastructure against hackers or maliciousinsiders attempting to steal data. This effort may require focusing ondata-centric security for confidential information, which entails relyingon not only traditional outside-in protection but also on protection fromthe inside-out.65 .aspx?language us&name Anatomy of a Data Breach6 out/wp trends-cloud-journey.pdf

Employee mobility may prove disastrous.Mobile devices enable the workforce toaccess data from virtually anywhere atany time, allowing greater flexibility andproductivity. Freedom, however, maycome at a price.56%of employees veryfrequently or frequentlystored sensitive dataon their laptops,smartphones, tablets, andother mobile devices.Research shows that 56% ofemployees very frequently orfrequently stored sensitive data ontheir laptops, smartphones, tablets,and other mobile devices. This meansthere is more than a 50% chance thatconfidential information can land in thewrong hands should they lose these devices.The Bring-Your-Own-Device (BYOD) Era is here to stay. As more andmore business data is stored in or accessed by devices that are not fullycontrolled by IT administrators, the likelihood of data loss incidentscaused by improperly secured personal devices will continue to rise.77 http://it.trendmicro.com/imperia/md/content/uk/12 security predictions for 2012.pdf

SMBs fail to routinely back up data.Less than 50% of SMBs routinely back updata. This, along with risky employeebehaviors, the BYOD trend, lack ofadequate security protection, andvarious other threats to data, isputting them at great risk.62%of SMBs do not routinelyWithout an automated backup andback up data.recovery strategy in place, SMBshave very little ammunition should adisaster strike. In fact, according toanother Ponemon Institute study, 62%of SMBs were not confident of avoidingsubstantial downtime in the event of a seriousincident.8 About a third of U.S. companies also had no backup anddisaster recovery strategies in place, citing lack of budget and resourcesas primary reasons.8 397/

SMBs do not enforce data security policies.SMBs run the risk of losing data, employee productivity, revenue, andtheir reputation with the exponentially increasing number of databreaches. While technologies are important in data protection, properlymanaging the “human factor” will also help prevent your organizationfrom becoming a data breach victim.Source: Ponemon Institute, 2012SMBs should ensure data protection policies are put in place,communicated to employees, insiders and customers, and strictlyimplemented. In fact, 80% of organizations, regardless of size, believemanaging and monitoring end-user privileges and entitlements is themost important security measure against data breaches.TOP 5 DATA PROTECTION AND SECURITY MEASURES TO ADDRESS HUMAN FACTORRISKS IN DATA PROTECTIONKnowing “who, what, when, and how” data is accessed is key. SMBswould hugely benefit from creating policies for the use of social mediaand personal email, as most attacks begin with the simple act of fallingfor a social engineering lure.

WHAT YOU CAN DO TO HELP YOUR COMPANY AGAINST DATABREACHESTo help protect your company’s assets and data from breaches, follow these tips and best practices: Close your organization’s doors to malware.9 Installing and using effective anti-malware solutions insystems and devices that contain or have access to sensitive information is important. Just as you wouldnever leave your house’s doors open at night or when you’re not at home, your company’s doors shouldnever be left unguarded against people with malicious intent as well. Stress how important protecting data is. Inform your employees and other insiders about yourcompany’s security policies. Stress the personal and business consequences of not protecting their mobiledevices, systems, storage devices, and the confidential data these contain from loss or theft. Don’t let social networking endanger your network. Teach your employees how dangerousoversharing in social networking sites can be. Even if you cannot stop them from sharing information insocial media, you can opt to limit the amount of time they spend on these sites while at work to lessen thechances of your company’s security perimeter from being breached. Think of passwords as keys. The stronger the passwords to accounts are, the harder they are to crack.Keep in mind that without the right keys in hand, malicious insiders and outsiders alike will have a muchharder time getting to your company’s crown jewels. Patch holes in your organization’s walls. Identify which information is critical, who could and should beable to access it, then investigate the best ways to protect it with the aid of a trusted IT advisor. Like holesor cracks in walls, areas where your company data is most vulnerable can cause your security perimeterto crumble. Knowing is half the battle. Tell your employees that although losing unencrypted and improperlyprotected data stored in mobile devices may get them into trouble, failing to report such incidents isworse. This does not only put them but also their colleagues, customers, and the entire organization atgreat risk.9 TREND%20MICRO top 10 tips tokeep your small business safe.pdf

TREND MICRO TRENDLABSSMTrend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information withits Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over20 years’ experience, we deliver top-ranked client, server and cloudbased security that fits our customers’ and partners’ needs, stopsnew threats faster, and protects data in physical, virtualized and cloudenvironments. Powered by the industry-leading Trend Micro SmartProtection Network cloud computing security infrastructure, ourproducts and services stop threats where they emerge—from the Internet. They are supported by 1,000 threat intelligence experts aroundthe globe.TrendLabs is a multinational research, development, and supportcenter with an extensive regional presence committed to 24 x 7 threatsurveillance, attack prevention, and timely and seamless solutionsdelivery. With more than 1,000 threat experts and support engineersdeployed round-the-clock in labs located around the globe, TrendLabsenables Trend Micro to continuously monitor the threat landscapeacross the globe; deliver real-time data to detect, to preempt, and toeliminate threats; research on and analyze technologies to combat newthreats; respond in real time to targeted threats; and help customers worldwide minimize damage, reduce costs, and ensure businesscontinuity. 2012 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product orcompany names may be trademarks or registered trademarks of their owners.

environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge—from the Inter-net. They are supported by 1,000 threat intelligence experts around the globe. TRENDLABS. SM. TrendLabs is a multinational research .

Related Documents:

Risk Matrix 15 Risk Assessment Feature 32 Customize the Risk Matrix 34 Chapter 5: Reference 43 General Reference 44 Family Field Descriptions 60 ii Risk Matrix. Chapter 1: Overview1. Overview of the Risk Matrix Module2. Chapter 2: Risk and Risk Assessment3. About Risk and Risk Assessment4. Specify Risk Values to Determine an Overall Risk Rank5

Risk is the effect of uncertainty on objectives (e.g. the objectives of an event). Risk management Risk management is the process of identifying hazards and controlling risks. The risk management process involves four main steps: 1. risk assessment; 2. risk control and risk rating; 3. risk transfer; and 4. risk review. Risk assessment

81. Risk Identification, page 29 82. Risk Indicator*, page 30 83. Risk Management Ω, pages 30 84. Risk Management Alternatives Development, page 30 85. Risk Management Cycle, page 30 86. Risk Management Methodology Ω, page 30 87. Risk Management Plan, page 30 88. Risk Management Strategy, pages 31 89. Risk

1.5 Tactical Risk Decisions and Crisis Management 16 1.5.1 Risk preparation 17 1.5.2 Risk discovery 17 1.5.3 Risk recovery 18 1.6 Strategic Risk Mitigation 19 1.6.1 The value-maximizing level of risk mitigation (risk-neutral) 19 1.6.2 Strategic risk-return trade-o s for risk-averse managers 20 1.6.3 P

Depositary Receipts (ADRs, EDRs and GDRs) Derivatives XX X Hedging XX X Speculation XX X Risk Factors in Derivatives XX X Correlation Risk X X X Counterparty Risk X X X Credit Risk XX X Currency Risk Illiquidity Risk X X X Leverage Risk X X X Market Risk X X X Valuation Risk X X X Volatility Risk X X X Futures XX X Swap Agreements XX X

Risk analysis Process to comprehend the nature of risk and to determine the level of risk Risk appetite Amount and type of risk that the organization is prepared to take in order to achieve its objectives. Risk assessment Overall process of risk identification , risk analysis and risk eva

The potential benefits of digital risk initiatives include efficiency and productivity gains, enhanced risk effectiveness, and revenue gains. The benefits of Exhibit 1 Digital risk management can significantly reduce losses and fines in core risk areas. Risk 2017 Digital Risk Exhibit 1 of 3 Credit risk Risk areas osses 2015, billion

Correlation with market risk Non-diversifiable credit risk including contagion Downgrade risk ¾Market spreads can't be ignored Reinsurance spread might be higher Default/recovery could be higher or lower Liquidity low Downgrade risk higher Credit Risk Correlations Insurance risk Insurance business Equity risk, other investment risk