Data Breaches Research

Submitted by: Submitted by

Views: 54

Words: 681

Pages: 3

Category: Business and Industry

Date Submitted: 12/10/2014 12:13 AM

Report This Essay

How Do Data Breaches Occur?

* Employee loses an unencrypted portable device (smartphones, laptop, thumb

drive, backup tape)

* Property crimes (computers prime targets)

* Inside job (employee steals information)

* Stray faxes, emails

* Phishing scams and increasingly, Spear-Phishing (social engineering)

* Malware / virus attacks (especially when working remotely on an unsecured

network)

* Failure to purge/scrub computing devices scheduled for destruction

* Weaknesses in "Cloud" security

Greek Market Vs Global Market – Security Incidents

PWC – Information Security Survey 2013

“Must Do” Security Actions

1. Implement User Education & Awareness :

* Communicating safely and responsibly

* Using social media wisely

* Transferring digital files in a safe way

* Proper Password usage

* Avoiding losing important information

* Ensuring only the right people can read your information

* Staying safe from viruses and other malware

* Who to alert when you notice potential security incident?

* Knowing how not to be tricked into giving information away

This will ensure that all personnel who have access to information and information systems understand their daily responsibilities to handle, protect and support the company’s information security activities

2. Keep System up to date

Systems and software, including networking equipment, should be updated as patches and firmware upgrades become available.

3. Protect Information

Encryption techniques are available and have proven their effectiveness in specific circumstances such as Email sent in clear text, portable devices (laptops, USB keys, and smartphones) can be particularly easy targets for theft or can be lost.

4. Apply Mobile device security

Mobile devices create significant security and management challenges, especially when they hold confidential and sensitive information or can access the corporate...