Data Loss Prevention

更新时间:2023-06-26 09:08:23 阅读: 评论:0

Data Loss Prevention:Keeping nsitive data out of the wrong hands*Advisory Services
Security
Table of contents
The heart of the matter 2 Data curity breaches po a rious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations.
An in-depth discussion 6 Point solutions don’t work. For data loss prevention (DLP) to be effective, companies  must decide on the right strategy, engage the right people, target the right data, and employ  the right technology.
What this means for your business 12 An effective solution provides transparency over data u, controls nsitive data, and reduces  the likelihood and costs of a data breach.贾宝玉人物简介
July 2008
The heart of the matter
Data curity breaches po a rious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations.
2
In recent years, an increasing number of high-profile data curity breaches have made headlines. The events can not only expo a business to costly and devastating legal ramifications, they also can verely denigrate a brand—sometimes to the point of disrepair.
The breaches don’t just happen to the other guy. According to the Global State of Information Security Survey 2007 (GISS), a worldwide study by PricewaterhouCoopers LLP, CIO magazine, and CSO magazine, more than two-thirds of organizations do not maintain either an accurate inventory of ur data or a list of locations and jurisdictions where this information is stored. Only about half of all companies have a policy that address the protection, disclosure, and destruction of data. And, although nearly two-thirds of companies worldwide encrypt data in transmission, far fewer appear to encrypt data at rest—in databas  (45 percent), file shares (37 percent), laptops (40 percent), and backup tapes (37 percent).
佳能c100Companies cannot afford to take this lack of data curity lightly. Identity theft is rampant, accounting for approximately one-third of consumer complaints received by the Federal Trade Commission during each of the past three years.1 More than half (54 percent) of identity-theft-related data breaches can be attributed to theft or loss of a computer or electronic transportable media2—a percentage unlikely to diminish.月季花简笔画
State and federal regulators who are concerned about the protection of nsitive data are starting to impo stronger controls. They are levying stiff civil and financial penalties against organizations and their top executives for failure to comply with regulations, and are requiring that companies nd curity breach notifications to affected parties. Trial by fire has shown some organizations that noncompliance-related expens can be astronomical. In 2007, the average loss from a data breach was $6.3 million, an increa of 31 percent from 2006.3
奇妙的植物>缄默怎么读Complying with government regulation and curing nsitive information across the data life cycle can be challenging as well as costly. With
third-party outsourcing skyrocketing during the past veral years,
some companies are having difficulty keeping track of the data leaving their network. Others are finding it hard to ensure the integrity of data once it reaches its intended location. GISS shows that only one-quarter of companies believe they have an accurate inventory of third parties using customer data. And only one-fifth of tho are confident in their outsourced vendor’s curity.
With consumers and regulators demanding more control over nsitive data than ever, it is clear that—whether you’re a curity leader or a business line executive—now is the time for you to start bett
放松自己英文er protecting your company’s customer data, core intellectual property, trade crets, and regulated data.
1  Federal Trade Commission. 2008. “Consumer Fraud and Identity Theft Complaint Data”: 4
2 Ponemon Institute LLC. 2007. “Ponemon Study Shows Data Breach Costs Continue to
不畏浮云遮望眼自缘身在最高层
Ri”: 1-2
3 Symantec. 2008. “Trends for July - December 07”. Symantec Global Internet Security Threat
Report Volume XIII: 12-16
The heart of the matter
清肺润燥3
4

本文发布于:2023-06-26 09:08:23,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/82/1042633.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:浮云   简介   简笔画
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图