1
Are You Doing All You Can To Protect Your Critical Business Information? Today you need to empower your workforce to work anywhere, anytime, on any device. At the same time, you need to do everything you can to protect critical business information — particularly given the speed, sophistication and severe consequences of today’s attacks. Today’s attackers act quickly of breaches remain undiscoverd for months. of breaches are discovered by the affected company. 84% 66% 13% of intrusions take minutes. Today’s attackers are smart, and they don’t rely on one tactic 19% of breaches combine phishing, malware, hacking and entrenchment. Security incidents resulting in losses of more than $10 Million are up 51% from 2011. One big problem is that while security risks have dramatically evolved, security strategies— typically compliance-based and perimeter-oriented— haven’t kept pace. In other words, most organizations are now defending yesterday, even as their adversaries exploit the threats of tomorrow. The attack surface has expanded The attack surface has expanded as an ever-greater volume of data flows through multiple channels – including to partners, suppliers, customers and others. And hot-button technologies like cloud computing, mobility, and BYOD are often implemented before they are fully secured. Given today’s constantly shifting technology landscape, IT must be able to simplify security, protect intellectual property, ensure data privacy, and meet compliance mandates while providing employees with the appropriate level of secure access and collaboration they need to get their work done. Security technologies are critical 89% of IT decision makers said security technologies are now critical or important to creating business advantages. What’s needed is a policy-driven approach to information security. One that’s informed by an understanding of threats, high-value information, and the motives and targets of potential adversaries. Then you need to enforce this policy framework and monitor it continuously. Follow these 7 best practices to protect your critical business information: Take a modern, mobile and ser- vices-based view of security policies. Enforce policies consistently across user and usage models. Automate security seamlessly – building desired behaviors into the user experience – and monitor your effectiveness continuously. Engage with line of business organizations to ensure that security is core to all information technology initiatives. Focus on comprehensive security that protects across data, applications, devices, networks and usage. Educate users – that means making security personal and specific to the job people are doing. Audit, measure and report on security effectiveness across governance, compliance and risk management programs. Architect and maintain an information technology foundation that builds security directly into the business solution. Citrix empowers secured access to information for people wherever they may work. To learn more, go to: citrix.com/secure Works Cited: 1–4 Verizon 2013 Data Breach Investigations Report 5-7, 2014 Global State of Information Security Survey, conducted by PwC, CIO and CSO magazines 8 State of the Enterprise 2013, IDG Research 1 2 3 4 5 6 7 8 Is your organization up to the challenge? = Security technologies Business advantages 1 3 1 2 3 6 3 3 3 5 3 7 3 4

7 Best Practices to Protect Critical Business Information [Infographic]

  • Upload
    citrix

  • View
    2.062

  • Download
    0

Embed Size (px)

DESCRIPTION

Is your organization ready for today’s security challenges? You need a policy-driven information security approach that you can enforce and monitor. Read this infographic and follow the 7 best practices to protect your company’s critical business information.

Citation preview

Page 1: 7 Best Practices to Protect Critical Business Information [Infographic]

Are You Doing All You CanTo Protect Your CriticalBusiness Information?

Today you need to empower your workforce to work anywhere, anytime, on any device. At the same time, you need to do everything you can to protect critical business information —particularly given the speed, sophistication and severe consequences of today’s attacks.

Today’s attackers act quickly

of breachesremain undiscoverd

for months.

of breachesare discoveredby the affected

company.

84% 66% 13%of intrusions

take minutes.

Today’s attackers are smart,and they don’t rely on one tactic

19% of breaches combine phishing, malware,hacking and entrenchment.

Security incidents resulting inlosses of more than

$10 Millionare up 51% from 2011.

One big problem is that while security risks have

dramatically evolved, security strategies—

typically compliance-based and perimeter-oriented—

haven’t kept pace. In other words, most organizations

are now defending yesterday, even as their

adversaries exploit the threats of tomorrow.

The attack surface has expanded

The attack surface has expanded as anever-greater volume of data flowsthrough multiple channels – includingto partners, suppliers, customersand others.

And hot-button technologies likecloud computing, mobility, and BYODare often implemented before theyare fully secured.

Given today’s constantly shifting technology landscape, IT must be able to simplifysecurity, protect intellectual property, ensure data privacy, and meet compliance mandates while providing employees with the appropriate level of secure access andcollaboration they need to get their work done.

Security technologies are critical

89%of IT decision makers said security technologiesare now critical or important to creatingbusiness advantages.

What’s needed is a policy-driven approach to information security. One that’s informed by an understanding of threats, high-value information, and the motives and targets of potential adversaries. Then you need toenforce this policy framework and monitor it continuously.

Follow these 7 best practices toprotect your critical business information:

Take a modern, mobile and ser-vices-based view ofsecurity policies. Enforcepolicies consistently acrossuser and usage models.

Automate securityseamlessly – building desired behaviors into the userexperience – and monitor your effectiveness continuously. 

Engage with line of business organizationsto ensure that security is core to all information technology initiatives.

Focus on comprehensive security that protects across data, applications, devices, networks and usage. 

Educate users – that means making securitypersonal and specific to the job people are doing.

Audit, measure and report on security effectiveness across governance, compliance and risk management programs.

Architect and maintain aninformation technology foundation that builds securitydirectly into the business solution.

Citrix empowers secured accessto information for people whereverthey may work. To learn more, go to:

citrix.com/secure

Works Cited:1–4 Verizon 2013 Data Breach Investigations Report5-7, 2014 Global State of Information Security Survey, conducted by PwC, CIO and CSO magazines 8 State of the Enterprise 2013, IDG Research

1

2

3

4

5

6

7

8

Is your organization up to the challenge?

=

Security technologies Business advantages

1

3

1

2 36

33

35

37

34