To protect their sensitive data, organizations must deal with a variety of threats – including cybercriminals, advanced persistent threats, malicious insiders and unintentional leaks.
A GROWING THREAT
VIGILANT DEFENSE
An effective data loss prevention program requires the right technologies and policies in place and working together.
DLP: COORDINATED SECURITY
88%25,566
As organizations address the wide variety of threats they face, from around the world to inside their own offices, they need a holistic approach to security and data loss prevention (DLP). �ey must take into account how different users and different data sets all interconnect on different systems.
A 2014 security study found that every 49 minutes, sensitive data is unintentionally sent outside an enterprise. An effective DLP system will identify essential data, monitor it and protect it whether the data is in motion on a network, at rest in a storage system or in use on an endpoint.
Among the elements of an effective DLP system: discovery technology for sensitive data at rest, in use and in motion; prevention technology to stop the unintentional leakage of data; and data governance technology to provide data owner identification and visibility into file usage details.
39% list social media applications, while
38% say cloud-based appsare most vulnerable
A wide variety of organizations have suffered high-profile data breaches, including federal, state and local government agencies; educational institutions and school districts; nonprofit groups; and small, midsize and large businesses.
�e percentage of organizations that experienced at least one data loss incident in 2013
�e number of federal agency data breaches in 2013 involving information such as taxpayer data, census data, Social Security information or patient health information
THE ROGUES’ GALLERY
PIECING THE PUZZLE TOGETHER
57%
SOURCES
To learn more about data loss prevention and CDW’s security expertise,visit CDW.com/datasecurity.
http://www.checkpoint.com/documents/ebooks/security-report-2014/files/assets/common/downloads/Check%20Point%20Security%20Report%202014.pdfhttp://www.gao.gov/products/GAO-14-487Thttp://www.trustedcs.com/resources/whitepapers/Ponemon-RaytheonPrivilegedUserAbuseResearchReport.pdfhttp://www.sophos.com/en-us/threat-center/medialibrary/PDFs/other/sophos-security-threat-report-2014.pdfhttp://www.trustedcs.com/resources/whitepapers/Ponemon-RaytheonPrivilegedUserAbuseResearchReport.pdf
A trusted partner can help organizations plan and deploy a DLP system. CDW’s certified specialists can assist with every phase of choosing and leveraging the right solution for any IT environment.
�e percentage of IT professionals who use automated tools to grant privileged
user access to IT resources
BUILDING TRUST
�e number of smartphones lost every minute in the United States
113
�e percentage of IT professionals who list mobile
applications as among the most at risk in their organizations
48%
Trends such as mobility, cloud computing, social media and the Internet of �ings all pose increasing challenges for data security.
89%�e percentage of IT professionals who are increasingly concerned about insider threats
PRESSURE PACKED