Submitted by: Submitted by aioannou76
Views: 54
Words: 681
Pages: 3
Category: Business and Industry
Date Submitted: 12/10/2014 12:13 AM
How Do Data Breaches Occur?
* Employee loses an unencrypted portable device (smartphones, laptop, thumb
drive, backup tape)
* Property crimes (computers prime targets)
* Inside job (employee steals information)
* Stray faxes, emails
* Phishing scams and increasingly, Spear-Phishing (social engineering)
* Malware / virus attacks (especially when working remotely on an unsecured
network)
* Failure to purge/scrub computing devices scheduled for destruction
* Weaknesses in "Cloud" security
Greek Market Vs Global Market – Security Incidents
PWC – Information Security Survey 2013
“Must Do” Security Actions
1. Implement User Education & Awareness :
* Communicating safely and responsibly
* Using social media wisely
* Transferring digital files in a safe way
* Proper Password usage
* Avoiding losing important information
* Ensuring only the right people can read your information
* Staying safe from viruses and other malware
* Who to alert when you notice potential security incident?
* Knowing how not to be tricked into giving information away
This will ensure that all personnel who have access to information and information systems understand their daily responsibilities to handle, protect and support the company’s information security activities
2. Keep System up to date
Systems and software, including networking equipment, should be updated as patches and firmware upgrades become available.
3. Protect Information
Encryption techniques are available and have proven their effectiveness in specific circumstances such as Email sent in clear text, portable devices (laptops, USB keys, and smartphones) can be particularly easy targets for theft or can be lost.
4. Apply Mobile device security
Mobile devices create significant security and management challenges, especially when they hold confidential and sensitive information or can access the corporate...