As businesses large and small become more dependent on electronic data, a major focus has shifted towards information security. Businesses are investing more than ever to protect themselves from dozens of security threats, from malware infections to financial fraud.
In a survey of businesses worldwide almost every industry surveyed had experienced an information security-based incident at some point in time. In the survey conducted, respondents covered numerous industries with the majority being from the Information Technology side and making up 10.9% of all those surveyed.
This is followed by industries such as financial services, education, the Federal Government, health and manufacturing, in that order, among others. 41% of this mix admitted to having faced a security threat.
From 2007 to 2010, the kind of attacks, although the same, have risen in occurrence.
- Malware infections are up to 67.1%
- Phishing is at 38.9%
- Device theft stands at about 33.5%
- Other forms have been bots on the network, insider abuse, denial of service, password sniffing, financial fraud and misuse of wireless networks
Almost 75% of major organizations today encourage staff to use their personal devices to connect to corporate systems. In small businesses, this stands at 61%. As a result, almost 82% of large companies have reported a breach of security by their own staff.
As information security becomes more of a priority in the future, here are a few things your organization can start doing now to protect itself:
- Implement a privacy and data security plan
- Conduct an inventory of potential data targets
- Protect data collected online
- Create levels of security
- Plan ahead for data loss
A Network Security plan is also needed, and of course the ability to create strong passwords is a must to better handle security issues. To learn more about information security and businesses, take a look below at the infographic created by the University of Alabama at Birmingham:
Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.
- Attention General Counsel: Do You Know Your DDoS from Your APT?
- Target and the Security Liability Blame Game
- Board Dynamics: Do BoDs Understand the Impact of Cyber Attacks?
- The Role of Security in Creating a Standard of Due Care
Check out Tripwire SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Heartbleed vulnerability.
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock