Orthus, a leading provider of innovative and independent information security services and solutions, publishes the results from monitoring over 100,000 hours of user activity. This activity is captured through the delivery of the unique Data Leakage Audit Service.
The results are based on the survey of 12 months research. Findings show that there is no an organization that does not suffer from multiple instances of data leakage. Some organizations damage because of information leakage that does not work to advantage to business.
The analysis of 100,000 hours of user activity underlines exactly who, where, when and how critical information assets are removed from the infrastructure and demonstrated that the real problem – and the solution – is all about the user.
Key results from the survey are:
Corporate data leakage was most likely to occur through mobile devices with 68% of all events identified linked to mobile rather than fixed desktop systems.
Information Technology and Customer Services Departments had the highest incidence of data leakage.
Most incidents of data leakage occur during the extended working day (7-7 Monday to Friday).
The applications most favored by users to remove sensitive data were identified as web mail, instant messaging (IM) and social networking web sites.
The top 4 data leakage vectors were identified as mobile devices, web mail, removable media and corporate email.
All data leakage incidents identified could have been prevented. Existing corporate security policies were not implemented, monitored or enforced.
The software itself records suspicious actions and identifies whether information is sent or copied to an unauthorized device or whether it is uploaded or transferred through an unauthorized application.
Managing Director of Orthus, Richard Hollis said: “Companies continue to try and protect information by protecting the architecture deploying devices to protect devices. They neglect the protection of data”.
“Until organizations accept that the majority of losses are associated with authorized users and implement the necessary controls where they are effective – between the user and the information itself – these losses will continue”.
Most Trendings
-
The Blogvasion.com Family of Blogs offers you an affordable and effective Internet advertising programs. Currently the Blogvasion.com family...
-
A new 3G iPhone Unlock software is launched by UK entrepreneur Mark Scott and his team of software developers. It gives iPhone customers th...
-
No need for traveling to the North Pole to inform Santa about the wishes you have, no need to send a letter, and no need to ... But just onl...
-
Games have been an enormous driver behind the triumph of the iPhone , with many people using their smartphone by Apple more as a handy g...
-
Japanese business etiquette is the subject of entire books - mostly written by people who have not been to Japan since the 1970s and want u...
Popular Posts
-
The Blogvasion.com Family of Blogs offers you an affordable and effective Internet advertising programs. Currently the Blogvasion.com family...
-
A former prisoner of the Pentridge Prison, Melbourne, Australia, decided to buy his own jail cell, where he had spent several years for frau...
-
Pilar Stofega, a 34-year old resident of Waterford, Connecticut, was charged with the attempt to destroy her ex-lover’s marriage by using in...
-
Once EE launches the first 4G service in the UK the online gaming industry is expecting to see a huge boost in the number of people accessi...
-
No need for traveling to the North Pole to inform Santa about the wishes you have, no need to send a letter, and no need to ... But just onl...
-
The consumer electronics industry has for many years now tried to shoe-horn a game (some would say game-like) experience on the mobile phone...
-
Corporate Telecommunications presents the service that gives the users opportunity to diagnose their headsets: who is using which headset, w...
-
Japanese business etiquette is the subject of entire books - mostly written by people who have not been to Japan since the 1970s and want u...
-
It is hardly imaginable to be a parent and have no concerns about the influences that environment has over youngster. In a highly competitiv...
-
Recently the UK researchers browsed the various legislations in search of the most ludicrous laws. The results were submitted to polling. He...
0 comments :
Post a Comment