Orthus, a leading provider of innovative and independent information security services and solutions, publishes the results from monitoring over 100,000 hours of user activity. This activity is captured through the delivery of the unique Data Leakage Audit Service.
The results are based on the survey of 12 months research. Findings show that there is no an organization that does not suffer from multiple instances of data leakage. Some organizations damage because of information leakage that does not work to advantage to business.
The analysis of 100,000 hours of user activity underlines exactly who, where, when and how critical information assets are removed from the infrastructure and demonstrated that the real problem – and the solution – is all about the user.
Key results from the survey are:
Corporate data leakage was most likely to occur through mobile devices with 68% of all events identified linked to mobile rather than fixed desktop systems.
Information Technology and Customer Services Departments had the highest incidence of data leakage.
Most incidents of data leakage occur during the extended working day (7-7 Monday to Friday).
The applications most favored by users to remove sensitive data were identified as web mail, instant messaging (IM) and social networking web sites.
The top 4 data leakage vectors were identified as mobile devices, web mail, removable media and corporate email.
All data leakage incidents identified could have been prevented. Existing corporate security policies were not implemented, monitored or enforced.
The software itself records suspicious actions and identifies whether information is sent or copied to an unauthorized device or whether it is uploaded or transferred through an unauthorized application.
Managing Director of Orthus, Richard Hollis said: “Companies continue to try and protect information by protecting the architecture deploying devices to protect devices. They neglect the protection of data”.
“Until organizations accept that the majority of losses are associated with authorized users and implement the necessary controls where they are effective – between the user and the information itself – these losses will continue”.
Most Trendings
-
The British Broadcasting Corporation that operates several television networks and stations and Myspace – social networking website that off...
-
Political Base that features ranging from serious blogs and a variety of YouTube videos represents the political forum. The site gives visit...
-
Do you want to never work for anyone else, write a resume, go to college, or apply for a job, and earn more money than most people do alongs...
-
The mobile giant has acquired a Redmond-based social networking startup Twango . The financial side of the transaction were not disclosed bu...
-
According to the CiTRIX, it unveiled the next phase of its vision and roadmap to radically change the economics of desktop computing. Citrix...
Popular Posts
-
The Blogvasion.com Family of Blogs offers you an affordable and effective Internet advertising programs. Currently the Blogvasion.com family...
-
Pilar Stofega, a 34-year old resident of Waterford, Connecticut, was charged with the attempt to destroy her ex-lover’s marriage by using in...
-
A former prisoner of the Pentridge Prison, Melbourne, Australia, decided to buy his own jail cell, where he had spent several years for frau...
-
Once EE launches the first 4G service in the UK the online gaming industry is expecting to see a huge boost in the number of people accessi...
-
No need for traveling to the North Pole to inform Santa about the wishes you have, no need to send a letter, and no need to ... But just onl...
-
Corporate Telecommunications presents the service that gives the users opportunity to diagnose their headsets: who is using which headset, w...
-
Japanese business etiquette is the subject of entire books - mostly written by people who have not been to Japan since the 1970s and want u...
-
It is hardly imaginable to be a parent and have no concerns about the influences that environment has over youngster. In a highly competitiv...
-
Recently the UK researchers browsed the various legislations in search of the most ludicrous laws. The results were submitted to polling. He...
-
In the previous post I wrote about traditional Christmas dinner in different countries. Now I have added more countries' Christmas dinne...
0 comments :
Post a Comment