SlideShare a Scribd company logo
1 of 1
Download to read offline
10101101010010110101010010111 laptop is stolen 
10010010010101101001011010010010010110EVERY 53 SECONDS 
010101001011010010101101010010101011010010101101010010100100100101011 HQ 
011010101101001010010110101101010010101001010110101001011010100100100100110111010110101001011010101001011010101001011010011011010110100101101011010100101101010100101101010100101101001010110101001010101101001010110101001010 
1011010010100101101011010010101101001010010100101101010110100101001011010110100 
75% 
Liquid spills are responsible for 
of all laptop damages. 60% 
101101001010010110101101001010110100101001010010110 
of the workforce 
is now mobile. 
The average employee has 3.3 
connected devices. 
And 70% of professionals use personal 
devices to access corporate data. 
of IT & IS pros 
traced the loss of 
sensitive information 
70% 
to USB drives. 
They can also carry malware, which can infect 
corporate networks with malicious code. 
40% of liquid spills are 
from coee. 
of employees save 
corporate files on USB 
drives. 
66% 
And most people who find them laying around 
pick them up and plug them in to see what’s 
on them. 
MORE THAN 1/2 
of all open Wi-Fi networks are 
susceptible to abuse. 
of employees use file 
sharing services for work 
purposes. 72% 
Even though 77% of companies prohibit this. 
Within the next 3-4 years, more than 
of corporate data will reside in the 
cloud, outside the data center. 50% 
More than half of laptops stolen result in data 
breaches. 
010110101001010101101001010110101001010010010010101101101001010 
Sources: 
Protect  govern corporate data anywhere, anytime. 
Learn more at druva.com/inSync 
Wi-Fi attack on a public network can take 
less than two seconds. 
www.slideshare.net/DruvaInc/druva-40-scary-stats-about-data-at-risk 
www.sewelltech.com/top-10-liquid-spills-kill-laptop-computers/ 
www.tabtimes.com/news/ittech-stats-research/2012/02/10/security-firm-reveals-damage-lost-stolen-laptops-smartphones 
www.slideshare.net/ValaAfshar/50-wi-fitechstatsforbusiness 
Gartner, 2014

More Related Content

Similar to Data at-risk-infographic-v8-tall

lastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheetlastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheetSerhat Cakmakoglu
 
2015 whats old is new again
2015 whats old is new again2015 whats old is new again
2015 whats old is new againDaren Dunkel
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsVishal Shah
 
Introduction to contact tracing apps and privacy issues
Introduction to contact tracing apps and privacy issuesIntroduction to contact tracing apps and privacy issues
Introduction to contact tracing apps and privacy issuesChristian Spolaore
 
A4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyA4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyDr. Wilfred Lin (Ph.D.)
 
Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber AttacksInuit AB
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...UL Transaction Security
 
Broadcom Customer Presentation
Broadcom Customer PresentationBroadcom Customer Presentation
Broadcom Customer PresentationSplunk
 
Infographic: Mobile Security Research
Infographic: Mobile Security ResearchInfographic: Mobile Security Research
Infographic: Mobile Security ResearchCisco Security
 
coronavirus-and-remote-working-presentation.pptx
coronavirus-and-remote-working-presentation.pptxcoronavirus-and-remote-working-presentation.pptx
coronavirus-and-remote-working-presentation.pptxAmirulSyazwan19
 
Securing Information Systems
Securing Information SystemsSecuring Information Systems
Securing Information SystemsUgyen Dorji
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khaiSecurity Bootcamp
 
3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)Isaac Feliciano
 
Your Mobile Internet Device
Your Mobile Internet DeviceYour Mobile Internet Device
Your Mobile Internet DeviceChristian Nord
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 

Similar to Data at-risk-infographic-v8-tall (20)

Laptop theft statistics
Laptop theft statisticsLaptop theft statistics
Laptop theft statistics
 
lastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheetlastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheet
 
2015 whats old is new again
2015 whats old is new again2015 whats old is new again
2015 whats old is new again
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En Us
 
Introduction to contact tracing apps and privacy issues
Introduction to contact tracing apps and privacy issuesIntroduction to contact tracing apps and privacy issues
Introduction to contact tracing apps and privacy issues
 
Laptop physical security
Laptop physical securityLaptop physical security
Laptop physical security
 
A4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyA4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiency
 
Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber Attacks
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
Broadcom Customer Presentation
Broadcom Customer PresentationBroadcom Customer Presentation
Broadcom Customer Presentation
 
Infographic: Mobile Security Research
Infographic: Mobile Security ResearchInfographic: Mobile Security Research
Infographic: Mobile Security Research
 
coronavirus-and-remote-working-presentation.pptx
coronavirus-and-remote-working-presentation.pptxcoronavirus-and-remote-working-presentation.pptx
coronavirus-and-remote-working-presentation.pptx
 
Securing Information Systems
Securing Information SystemsSecuring Information Systems
Securing Information Systems
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khai
 
3 steps security
3 steps security3 steps security
3 steps security
 
3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)
 
Your Mobile Internet Device
Your Mobile Internet DeviceYour Mobile Internet Device
Your Mobile Internet Device
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 

Data at-risk-infographic-v8-tall

  • 1. 10101101010010110101010010111 laptop is stolen 10010010010101101001011010010010010110EVERY 53 SECONDS 010101001011010010101101010010101011010010101101010010100100100101011 HQ 011010101101001010010110101101010010101001010110101001011010100100100100110111010110101001011010101001011010101001011010011011010110100101101011010100101101010100101101010100101101001010110101001010101101001010110101001010 1011010010100101101011010010101101001010010100101101010110100101001011010110100 75% Liquid spills are responsible for of all laptop damages. 60% 101101001010010110101101001010110100101001010010110 of the workforce is now mobile. The average employee has 3.3 connected devices. And 70% of professionals use personal devices to access corporate data. of IT & IS pros traced the loss of sensitive information 70% to USB drives. They can also carry malware, which can infect corporate networks with malicious code. 40% of liquid spills are from coee. of employees save corporate files on USB drives. 66% And most people who find them laying around pick them up and plug them in to see what’s on them. MORE THAN 1/2 of all open Wi-Fi networks are susceptible to abuse. of employees use file sharing services for work purposes. 72% Even though 77% of companies prohibit this. Within the next 3-4 years, more than of corporate data will reside in the cloud, outside the data center. 50% More than half of laptops stolen result in data breaches. 010110101001010101101001010110101001010010010010101101101001010 Sources: Protect govern corporate data anywhere, anytime. Learn more at druva.com/inSync Wi-Fi attack on a public network can take less than two seconds. www.slideshare.net/DruvaInc/druva-40-scary-stats-about-data-at-risk www.sewelltech.com/top-10-liquid-spills-kill-laptop-computers/ www.tabtimes.com/news/ittech-stats-research/2012/02/10/security-firm-reveals-damage-lost-stolen-laptops-smartphones www.slideshare.net/ValaAfshar/50-wi-fitechstatsforbusiness Gartner, 2014