3 Perspectives Around Data Breaches

7
INTERNET SECURITY THREAT REPORT 3 PERSPECTIVES AROUND DATA BREACHES HOW ROBUST IS YOUR INFORMATION PROTECTION STRATEGY? Based on exclusive research from 2015 Symantec’s Internet Security Threat Report

Transcript of 3 Perspectives Around Data Breaches

Page 1: 3 Perspectives Around Data Breaches

INTERNET SECURITY THREAT REPORT

3 PERSPECTIVES AROUND DATA BREACHESHOW ROBUST IS YOUR INFORMATION PROTECTION STRATEGY?

Based on exclusive research from 2015 Symantec’s Internet Security Threat Report

Page 2: 3 Perspectives Around Data Breaches

ISTR20 3 perspectives around Data Breaches 2

Perspective 1 - Data Breaches are still a significant issue

312

253

156

+23%

+62%

2014

2013

2012

20% of companies did not report on exposure of information in 2014.

(Up from 16% in 2013)

Total BreachesSource: Symantec

Page 3: 3 Perspectives Around Data Breaches

ISTR20 3 perspectives around Data Breaches 3

What’s causing Data Breaches?

Attackers become more aggressive

49%

34%

10%

56%

8%

43% 2013

Insider Theft/Fraud

Accidentally exposed/Theft or Loss of Device

Attackers

2014

Page 4: 3 Perspectives Around Data Breaches

ISTR20 3 perspectives around Data Breaches 4

Perspective 2 - How is your data at risk – Ransomware or digital extortion?

Ransomware attacks grew 113% and 45 times more people had their devices held hostage in 2014

Page 5: 3 Perspectives Around Data Breaches

ISTR20 3 perspectives around Data Breaches 5

Perspective 3 - Consumer attitudes to data privacy weaken your information protection strategy

What about our own staff? When we download an application on our smartphones, do we understand the data sharing that is involved?

Vendors could share your data again

68% of people asked were willing to trade privacy for a free app

How is Health App Data Shared?

APP ANALYTICS

AD NETWORKS

APP PROVIDER

OS PROVIDER

SOCIAL MEDIA

APP FRAMEWORKS

CRM/MARKETING

UTILITY API

MAX DOMAINSCONTACTED

AVG DOMAINSCONTACTED

14

5

Page 6: 3 Perspectives Around Data Breaches

ISTR20 3 perspectives around Data Breaches 6

Here are four tips to anticipate an attack

Don’t get flat footed – be proactive by using intelligence (e.g. ransomware means you need a robust back up strategy)

Prepare for the worst – assume you will be breached. So how do you DETECT this quickly? What is your incident response?

Develop a strong security posture – multiple layers to your defences

Educate your staff – what they do at home isn’t always right in the office. Data privacy matters

Managed Security Services Website Security Solutions

Endpoint Protection Data Loss Prevention

Email Security Deep Sight Intelligence

Managed Security Services Website Security Solutions

Endpoint Protection Data Loss Prevention

Email Security Deep Sight Intelligence

Page 7: 3 Perspectives Around Data Breaches

ISTR20 3 perspectives around Data Breaches 7

Looking forward

For more insights and recommendations, download the report here: http://know.symantec.com/LP=1123 Get in contact with us: http://know.symantec.com/gbcontactcenter

#SymantecISTR

The ISTR covers a wealth of topics:

advanced threats data protection mobile user access the Internet of Things