This global study involving 350 companies in 16 industry sectors looks at the impact of data breaches and trends. The results from this annual research give insight and a better understanding of the factors that can minimise the financial consequences of a data breach, as well as the positive impact a business continuity management (BCM) program can have on the financial and reputational consequences of breaches.
Organisations are readily launching BYOD programs to boost employee productivity and reduce costs. But this all comes at a risk and you maintain your vigilance in sustaining compliance with data security and privacy regulations. This whitepaper looks at several best practices are key for maintaining regulatory compliance with any BYOD program.
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to - and recovering from - sophisticated security attacks” details four proactive steps that you can - and should - take now to help keep your organisation safe: prioritise your business objectives and set your risk tolerance; protect your organisation with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organisation safe from sophisticated security attacks and find out how IBM can help.
Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
A study conducted by Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-Crime Unit and United States Secret Service. This year our DBIR includes more incidents, derived from more contributors, and represents a broader and more diverse geographical scope. The number of compromised records across these incidents skyrocketed back up to 174 million after reaching an all-time low (or high, depending on your point of view) in last year’s report of four million. In fact, 2011 boasts the second-highest data loss total since we started keeping track in 2004. Read this report.
- Answer 5 quick questions and you could win a Lego Mindstorm EV3, (valued at $499).
- 6 cities | 20 exhibitors | International & local keynotes | Hear from Mark Loveless 'Simple Nomad' & Jeff Lanza Former FBI - Save your seat at CSO Perspectives Roadshow
- Participate in this market research and go into the draw to win a Lego Death Star, (valued at $999).
- WIN a HTC Vive Kit valued at $1399, take this 3 minute survey for your chance to WIN!