"2013 was a gangbuster year for embezzlement in the United States, exceeding even 2012’s previous record pace,” says Christopher T. Marquet, author of The 2013 Marquet Report on Embezzlement, released in December 2014. “What is remarkable is depth, magnitude and frequency of employee theft in the U.S. economy. Vermont topped the list of highest embezzlement risk states in the nation for the third time in six years.”
Rapid growth in the volume of sensitive information combined with new technologies has chipped away at the effectiveness of traditional endpoint protections and network perimeter security.
Account information for approximately 900 Morgan Stanley clients was, briefly, available online. One employee has been fired so far in the incident, and an investigation is ongoing.
In July 2014 alone, 940,000 people in the Professional and Business Services industry left their jobs, according to the Bureau of Labor Statistics. The question is: How much power and access do those people still have over company data?
BYOD is either a ticking time bomb or IT’s greatest opportunity. Whether you belong to the 40 percent of organizations that have policies or not, I guarantee people are using their own mobile devices at your office.
As your enterprise virtualizes and leverages cyber technology to speed productivity, the incidence of cybercrime will, of course, increase. Similarly, as your employees’ behavior, as consumers, drives the technology they use (BYOD), the cybercrime cat will continue to be let out of the bag.
While 86 percent of C-Suite executives are aware of the legal requirements supporting the protection of confidential data, one in five have never performed a security audit
September 1, 2014
The study also found that almost half of the small business owners surveyed conduct no regular audits of their security protocols, and three in 10 have never performed an audit.
While legislators have passed a multitude of statutes to aid in the protection of our economic interests pertaining to data systems – non-physical assets and privacy – frequently any course of action is still determined by the concept of monetary loss and treated as if someone was stealing or damaging physical assets, or as in the case of the Stored Communications Act (SCA), creating a statue that has been described as dense and confusing to even legal scholars.
Almost 1.2 million shoplifters and dishonest employees were apprehended in 2013 by just 23 large retailers. Over $199 million was recovered from these thieves, according to the 26th Annual Retail Theft Survey from Jack L. Hayes International.
Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information.