7 Best Practices to Protect Critical Business Information [Infographic]


Published on

Is your organization ready for today’s security challenges? You need a policy-driven information security approach that you can enforce and monitor. Read this infographic and follow the 7 best practices to protect your company’s critical business information.

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

7 Best Practices to Protect Critical Business Information [Infographic]

  1. 1. Are You Doing All You Can To Protect Your Critical Business Information? Today you need to empower your workforce to work anywhere, anytime, on any device. At the same time, you need to do everything you can to protect critical business information — particularly given the speed, sophistication and severe consequences of today’s attacks. Is your organization up to the challenge? Today’s attackers act quickly 84% 66% 13% of intrusions take minutes. 1 of breaches remain undiscoverd for months. 2 of breaches are discovered by the affected company.3 Today’s attackers are smart, and they don’t rely on one tactic 19% of breaches combine phishing, malware, hacking and entrenchment.4 Security incidents resulting in losses of more than $10 Million are up 51% from 2011.5 One big problem is that while security risks have dramatically evolved, security strategies— typically compliance-based and perimeter-oriented— haven’t kept pace. In other words, most organizations are now defending yesterday, even as their adversaries exploit the threats of tomorrow. 6 The attack surface has expanded The attack surface has expanded as an ever-greater volume of data flows through multiple channels – including to partners, suppliers, customers and others. And hot-button technologies like cloud computing, mobility, and BYOD are often implemented before they are fully secured.7 Given today’s constantly shifting technology landscape, IT must be able to simplify security, protect intellectual property, ensure data privacy, and meet compliance mandates while providing employees with the appropriate level of secure access and collaboration they need to get their work done. Security technologies are critical 89% of IT decision makers said security technologies are now critical or important to creating business advantages.8 = Security technologies Business advantages What’s needed is a policy-driven approach to information security. One that’s informed by an understanding of threats, high-value information, and the motives and targets of potential adversaries. Then you need to enforce this policy framework and monitor it continuously. Follow these 7 best practices to protect your critical business information: 1 Take a modern, mobile and services-based view of security policies. Enforce policies consistently across user and usage models. 2 3 Automate security seamlessly – building desired behaviors into the user experience – and monitor your effectiveness continuously.  3 Engage with line of business organizations to ensure that security is core to all information technology initiatives. 4 3 Architect and maintain an information technology foundation that builds security directly into the business solution. 5 3 Focus on comprehensive security that protects across data, applications, devices, networks and usage.  6 3 Educate users – that means making security personal and specific to the job people are doing. 7 3 Audit, measure and report on security effectiveness across governance, compliance and risk management programs. Citrix empowers secured access to information for people wherever they may work. To learn more, go to: citrix.com/secure Works Cited: 1–4 Verizon 2013 Data Breach Investigations Report 5-7, 2014 Global State of Information Security Survey, conducted by PwC, CIO and CSO magazines 8 State of the Enterprise 2013, IDG Research