INTERNET SECURITY THREAT REPORT
3 PERSPECTIVES AROUND
DATA BREACHES
HOW ROBUST IS YOUR INFORMATION
PROTECTION STRATEGY?
Based on exclusive research from
2015 Symantec’s Internet Security Threat Report
ISTR20 3 perspectives around Data Breaches 2
Perspective 1 - Data Breaches
are still a significant issue
312
253
156
+23%
+62%
2014
2013
2012
20% of companies did
not report on exposure
of information in 2014.
(Up from 16% in 2013)
Total Breaches
Source: Symantec
ISTR20 3 perspectives around Data Breaches 3
What’s causing Data Breaches?
Attackers become more aggressive
49%
34%
10%
56%
8%
43% 2013
Insider Theft/Fraud
Accidentally
exposed/Theft
or Loss of Device
Attackers
2014
ISTR20 3 perspectives around Data Breaches 4
Perspective 2 - How is your data at risk –
Ransomware or digital extortion?
Ransomware attacks
grew 113% and 45
times more people
had their devices held
hostage in 2014
ISTR20 3 perspectives around Data Breaches 5
Perspective 3 - Consumer attitudes to
data privacy weaken your information
protection strategy
What about our own
staff? When we download
an application on our
smartphones, do we
understand the data
sharing that is involved?
Vendors could share
your data again
68% of people asked were willing to
trade privacy for a free app
How is Health App Data Shared?
APP ANALYTICS
AD NETWORKS
APP PROVIDER
OS PROVIDER
SOCIAL MEDIA
APP FRAMEWORKS
CRM/MARKETING
UTILITY API
MAX DOMAINS
CONTACTED
AVG DOMAINS
CONTACTED
14
5
ISTR20 3 perspectives around Data Breaches 6
Here are four tips to
anticipate an attack
Don’t get flat footed
– be proactive by
using intelligence (e.g.
ransomware means you
need a robust back up
strategy)
Prepare for the worst
– assume you will be
breached. So how do
you DETECT this quickly?
What is your incident
response?
Develop a strong security
posture – multiple layers
to your defences
Educate your staff – what
they do at home isn’t
always right in the office.
Data privacy matters
Managed Security Services Website Security Solutions
Endpoint Protection Data Loss Prevention
Email Security Deep Sight Intelligence
Managed Security Services Website Security Solutions
Endpoint Protection Data Loss Prevention
Email Security Deep Sight Intelligence
ISTR20 3 perspectives around Data Breaches 7
Looking forward
For more insights and recommendations, download the report here:
http://know.symantec.com/LP=1123
Get in contact with us:
http://know.symantec.com/gbcontactcenter
#SymantecISTR
The ISTR covers a wealth of topics:
advanced threats data protection mobile user access the Internet
of Things

3 Perspectives Around Data Breaches

  • 1.
    INTERNET SECURITY THREATREPORT 3 PERSPECTIVES AROUND DATA BREACHES HOW ROBUST IS YOUR INFORMATION PROTECTION STRATEGY? Based on exclusive research from 2015 Symantec’s Internet Security Threat Report
  • 2.
    ISTR20 3 perspectivesaround Data Breaches 2 Perspective 1 - Data Breaches are still a significant issue 312 253 156 +23% +62% 2014 2013 2012 20% of companies did not report on exposure of information in 2014. (Up from 16% in 2013) Total Breaches Source: Symantec
  • 3.
    ISTR20 3 perspectivesaround Data Breaches 3 What’s causing Data Breaches? Attackers become more aggressive 49% 34% 10% 56% 8% 43% 2013 Insider Theft/Fraud Accidentally exposed/Theft or Loss of Device Attackers 2014
  • 4.
    ISTR20 3 perspectivesaround Data Breaches 4 Perspective 2 - How is your data at risk – Ransomware or digital extortion? Ransomware attacks grew 113% and 45 times more people had their devices held hostage in 2014
  • 5.
    ISTR20 3 perspectivesaround Data Breaches 5 Perspective 3 - Consumer attitudes to data privacy weaken your information protection strategy What about our own staff? When we download an application on our smartphones, do we understand the data sharing that is involved? Vendors could share your data again 68% of people asked were willing to trade privacy for a free app How is Health App Data Shared? APP ANALYTICS AD NETWORKS APP PROVIDER OS PROVIDER SOCIAL MEDIA APP FRAMEWORKS CRM/MARKETING UTILITY API MAX DOMAINS CONTACTED AVG DOMAINS CONTACTED 14 5
  • 6.
    ISTR20 3 perspectivesaround Data Breaches 6 Here are four tips to anticipate an attack Don’t get flat footed – be proactive by using intelligence (e.g. ransomware means you need a robust back up strategy) Prepare for the worst – assume you will be breached. So how do you DETECT this quickly? What is your incident response? Develop a strong security posture – multiple layers to your defences Educate your staff – what they do at home isn’t always right in the office. Data privacy matters Managed Security Services Website Security Solutions Endpoint Protection Data Loss Prevention Email Security Deep Sight Intelligence Managed Security Services Website Security Solutions Endpoint Protection Data Loss Prevention Email Security Deep Sight Intelligence
  • 7.
    ISTR20 3 perspectivesaround Data Breaches 7 Looking forward For more insights and recommendations, download the report here: http://know.symantec.com/LP=1123 Get in contact with us: http://know.symantec.com/gbcontactcenter #SymantecISTR The ISTR covers a wealth of topics: advanced threats data protection mobile user access the Internet of Things