While 86 percent of C-Suite executives are aware of the legal requirements supporting the protection of confidential data, one in five have never performed a security audit
September 1, 2014
The study also found that almost half of the small business owners surveyed conduct no regular audits of their security protocols, and three in 10 have never performed an audit.
While legislators have passed a multitude of statutes to aid in the protection of our economic interests pertaining to data systems – non-physical assets and privacy – frequently any course of action is still determined by the concept of monetary loss and treated as if someone was stealing or damaging physical assets, or as in the case of the Stored Communications Act (SCA), creating a statue that has been described as dense and confusing to even legal scholars.
When the Department of Homeland Security purposefully dropped data disks and USB flash drives in the parking lots of federal agencies and government contractors, 60 percent of the found objects were inserted into an agency or contractor network.
Nine of the country’s largest payment card issuers who participate in the Payments Security task force estimate that they will have issued more than 575 million chip-enabled payment cards by the end of 2015.
The Cisco 2014 Midyear Security Report, released at Black Hat U.S. examines the “weak links” in organizations that contribute to the increasingly dynamic threat landscape.
Moving information from enterprise data centers or in-network servers to a cloud environment is often chosen as a means to offload IT maintenance costs, provide a higher degree of physical safeguards and facilitate easier scaling to accommodate business growth.
Recipients can now receive view-only files, which cannot be downloaded, forwarded, or copied and pasted; files can be watermarked, and not available for editing; users can search files for key words and phrases
According to security researchers at IBM and the Cyber Security Intelligence Index, 95 percent of successful hack attacks or incidents were because of some type of human error.