When Data Loss Is An Inside Job

698 views
653 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
698
On SlideShare
0
From Embeds
0
Number of Embeds
223
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

When Data Loss Is An Inside Job

  1. 1. When Data Loss Is an Inside Job March 2012April 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 1
  2. 2. Don’t Look FarOutside forces poserisks, but companiesshould look closer tohome for securityglitches.Employees accountfor a majority of databreaches, according tothe 2011 Cost of a Data Breach Study from ThePonemon Institute.April 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 2
  3. 3. Pinpoint the ProblemAccording to the study, the top causes of data securityviolations are: Negligent insiders 24% 39% Malicious attacks 37% System glitchesApril 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 3
  4. 4. Rogues Run AmokNegligent insiders cause data breaches mainly throughcarelessness. Inside attacks are often perpetrated withmalice by employees or contractors. These attacks rose31% from 2010 and are the most expensive breaches.April 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 4
  5. 5. Chalk Up the CostsData security violations hit your organization where it hurts:the bottom line. average organization cost $5.5 million of a 2011 data breach cost of all attacks per $194 compromised record cost of malicious attacks $222 per compromised recordApril 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 5
  6. 6. Higher Costs to BearData breach price tags rise when:o it is the company’s first breacho there is fast notification of a violation without thorough assessmento the breach is caused by a third partyo a device with data is lost or stolenApril 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 6
  7. 7. Bear in Mind Data breach costs drop when: o a chief information security officer works to protect data o an outside consultant, such as IDT911’s Data Risk Management team, assists with a breach responseApril 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 7
  8. 8. Be Safe, Not SorryFollow these tips to keep your organization’s data secure: 1. classify data; assess risks 6. use two-factor authentication 2. educate staff about security 7. use an enhanced,integrated security solution 3. demand accountability 4. use data-loss prevention technology 5. encrypt laptop computersApril 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 8
  9. 9. Help Is at HandContact IDT911’s Data RiskManagement consultingservices.Our team will outline theresources we offer to reduceyour vulnerability and keepyour organization’s datasecure.April 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 9
  10. 10. SummaryDon’t let statistics leave you feeling worried about thesecurity of your company’s information.While breach threatsexist within everyorganization, IdentityTheft 911 can easeyour fears and keepyour data safe.April 11, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 10

×