Data at-risk-infographic-v8-tall

1
1 0 1 0 1 1 0 1 0 1 0 0 1 0 1 1 0 1 0 1 0 10 0 1 0 1 1 0 1 0 1 0 1 0 0 1 0 1 1 0 1 0 0 1 0 1 0 1 1 0 1 0 1 0 0 1 0 1 0 1 0 1 1 0 1 0 0 1 0 1 0 1 1 0 1 0 1 0 0 1 0 1 0 101101001 0 1 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 10 1 0 1 1 0 1 0 0 1 0 1 0 01010010110 1 0 1 1 0 1 0 0 1 0 1 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 1 01011010010100101 0 0 1 0 1 1 0 1 0 1 0 1 1 0 1 0 0 1 0 1 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 of the workforce is now mobile. The average employee has 3.3 connected devices. And 70% of professionals use personal devices to access corporate data. 75% of IT & IS pros traced the loss of sensitive information to USB drives. They can also carry malware, which can infect corporate networks with malicious code. 70% 40% of liquid spills are from coffee. Liquid spills are responsible for of all laptop damages. 60% of employees save corporate files on USB drives. And most people who find them laying around pick them up and plug them in to see what’s on them. 66% of all open Wi-Fi networks are susceptible to abuse. MORE THAN 1/2 of employees use file sharing services for work purposes. 72% Even though 77% of companies prohibit this. Within the next 3-4 years, more than of corporate data will reside in the cloud, outside the data center. 50% More than half of laptops stolen result in data breaches. 1 laptop is stolen EVERY 53 SECONDS 101101011010100101 0 1 0 0 1 0 1 0 110101001011010 1 1 0 1 0 1 1 0 1 0 0 1 0 1 1 01 0 0 1 0 0 1 0 0 1 0 0 1 1 0 1 1 0 1 1 0 1 0 1 0 1 1 0 1 0 0 1 0 1 0 0 1 0 0 1 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 1 0 1 101010100101101001 0 1 0 1 1 0 1 0 1 0 0 1 0 1 0 1 0 1 1 010010101101010 0 1 0 1 0 0 1 0 0 1 0 0 1 0 1 0 1 1 0 1101001010 1 0 1 0 1 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 0 1 0 1 1 0 1 0 0 1 0 1 0 1 1 0 1 0 1 0 0 1 0 1 0 1 0 1 1 0 1 0 0 1 0 1 0 1 101010010100100100101011 HQ Protect & govern corporate data anywhere, anytime. Learn more at druva.com/inSync Wi-Fi attack on a public network can take less than two seconds. www.slideshare.net/DruvaInc/druva-40-scary-stats-about-data-at-risk www.sewelltech.com/top-10-liquid-spills-kill-laptop-computers/ www.tabtimes.com/news/ittech-stats-research/2012/02/10/security-firm-reveals-damage-lost-stolen-laptops-smartphones www.slideshare.net/ValaAfshar/50-wi-fitechstatsforbusiness Gartner, 2014 Sources:

Transcript of Data at-risk-infographic-v8-tall

Page 1: Data at-risk-infographic-v8-tall

101011010

100101

10101010

0101

1010

10100101101001010

1101

0100101010110100101011

0101001010

101101001010010110101101001010110100101001010010110

1011010010

10010

11010110100101011010010100101001011010101

1010010

1001011

010110

100

of the workforce is now mobile.

The average employee has 3.3connected devices.

And 70% of professionals use personal devices to access corporate data.

75%

of IT & IS pros traced the loss of sensitive information

to USB drives.They can also carry malware, which can infect corporate networks with malicious code.

70%

40% of liquid spills are from co�ee.

Liquid spills are responsible for of all laptop damages.60%

of employees save corporate files on USB drives.

And most people who find them laying around pick them up and plug them in to see what’s on them.

66%

of all open Wi-Fi networks are susceptible to abuse.

MORE THAN 1/2

of employees use file sharing services for work purposes.72%

Even though 77% of companies prohibit this.

Within the next 3-4 years, more thanof corporate data will reside in the cloud, outside the data center. 50%

More than half of laptops stolen result in data breaches.

1 laptop is stolen

EVERY 53 SECONDS

101101011010100101010010101101010010110101101011010010110

100100100

100110

1101

1010

10110100

10100100

100100

101011010

01011010010010

0101

1010

0101

1010

101011010110

1010010

0100101

0101001001

10101101

01001011010

101001011010

101001011010

010101101010010101011010010101101010010100

1001001

0101101101001010

1010110101001011010101001011010101001

011010

01010110101001010101101001010110101001010010010

0101011HQ

Protect & govern corporate data anywhere, anytime. Learn more at druva.com/inSync

Wi-Fi attack on a public network can take less than two seconds.

www.slideshare.net/DruvaInc/druva-40-scary-stats-about-data-at-riskwww.sewelltech.com/top-10-liquid-spills-kill-laptop-computers/www.tabtimes.com/news/ittech-stats-research/2012/02/10/security-firm-reveals-damage-lost-stolen-laptops-smartphoneswww.slideshare.net/ValaAfshar/50-wi-fitechstatsforbusinessGartner, 2014

Sources: