Protecting Against Emerging Data Security Threats
Setnor Byer Insurance & Risk
Information Technology, Risk Management, Information Security
Cyber threats continue to top the list of concerns forindividuals and businesses alike. With breaches becomingmore common and more expensive, businesses are now discovering that steps must be taken to protect against data security breaches. Since understanding the risk is the first step to controlling it, let’s take a look at some observations made by Georgia Institute of Technology’s Information Security Center and Research Institute in their 2015 Emerging Cyber Threats Report.
Users are the greatest weakness to information security.
Though software vulnerabilities continue to be exploited, users remain the link most often exploited in attacks as cybercriminals continue to successfully abuse their trust.
Users often allow attackers to circumvent security measures.
Social engineering, which is also known as hacking humans, is a common and extremely effective way to attack systems. Sixty-seven percent of cyber attacks start with a phishing electronic communication sent by an attacker posing as a trustworthy person or business.
Training is an important piece of the security puzzle and one that businesses do not employ often enough. Forty-nine percent of businesses that do not perform employee security-awareness training pay the price — their annual losses are four times greater than those with a training process in place.
Attackers are increasingly targeting mobile devices.
As consumers and employees increasingly rely on mobile devices, their phones and linked cloud repositories have become treasure troves of information...
For the full article please visit: http://setnorbyer.com/riskbriefs/post/Protecting-Against-Emerging-Data-Security-Threats.aspx#post0
, Cyber Liability
, Cyber Threats
, Information Security
, Information Technology
, Risk Management
, Tech Insurance