Upload
trustwave
View
264
Download
1
Embed Size (px)
DESCRIPTION
During the past year, 90% of organizations experienced the loss of sensitive or confidential documents, whether through a breach, or through a compromised or careless employee. And customer records made up 98% of the data exposed - everything from credit card numbers to personally identifiable information. Do you have data worth stealing? Check out this new infographic and find out why it’s so important to secure and control your sensitive data – like we say here at Trustwave, it’s all about keeping the bad stuff out and keeping the good stuff in.
Citation preview
54%
445+30+15+5+5=
10+90+K
90%75%
52%
68%
TYPE OF DATA EXPOSED
¢ CUSTOMER RECORDS (89%)
¢ TRADE SECRETS (6%)
¢ ELECTRONIC-PROTECTED HEALTH INFORMATION (3%)
¢ BUSINESS FINANCIAL ACCOUNT NUMBERS (1%)
¢ AUTHENTICATION CREDENTIALS (1%)
of insiders who stole material from their employers had authorizedaccess to thatmaterial
of organizations say employees frequently or very frequently attach and send confidential documents in clear text using web-based email accounts
Trade secrets were stolen in
of insider theft cases
The majority of insider IP
thieves used a network —
email, a remote network
access channel or
network file transfer
to remove the
stolen data
56%
56%
56%
Among a sa
mpl
e of
eig
hty
new
v
iruses studied in mid-2012 …
8040
LEADING ANTIVIRUS VENDORS
NONE WERE DETECTED BY
81+19+P19%
GETSMISSEDBY AV
of exploits blocked in 2012 used Java vulnerabilities
increase in email-based attacks in first half of 2012
Interception of executable files
via email has
almost doubled
every year since2008
of malware attacks via email
used a link to a webpage
In 2012, there were 91.9 MILLION URLS serving malicious code
39%
of allmalware
Among IT pros at organizations with 1,000 or more email users, more than half believe their organizations were targeted by a spear phishing attack
of o
rgan
izat
ions experienced the loss of sensitive or con
f den
tial docum
ents during the past year
THINGS LOST DUE TO INADEQUATE IT SECURITY
Top secret oil drilling maps
Secure card key technology details
Multi-billion dollaracquisition deals
Designs for the US Joint Strike Fighter
SOURCES: www.itbusinessedge.com/blogs/data-security/good-phishing-techniques-continue-to-penetrate-in-corporate-networks.html;
http://cnsnews.com/news/article/chinese-hackers-stole-plans-americas-new-joint-strike-fighter-plane-says-investigations;
Trustwave Global Security report; www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/;
http://secanalysis.com/a-smattering-of-security-statistics/; www.indefenseofdata.com/data-breach-trends-stats/
www.messagingnews.com/story/are-larger-organizations-more-susceptible-spear-phishing-attacks;
www.infosecurity-magazine.com/view/29124/the-malware-threats-of-q3-analyzed/;
www.informationweek.com/security/attacks/rsa-breach-eight-months-later/231903048;
www.bloomberg.com/news/2012-11-04/coke-hacked-and-doesn-t-tell.html;
www.watchdox.com/doc?a=ov&c=aUPPLaBSELn4KEC5R8bbc0Q; www.trustwave.com