2
The Evolving Cyber Threat: Cloud and Data Security Resources to Consider QuinStreet Enterprise recently released results of a survey on the current state of Cyber- Threats. The survey of 387 business and IT executives, 2015 Security Outlook: Meeting Today’s Evolving Cyber Threats , revealed more of what we’ve already blogged about regarding cyber threats and security breaches; namely that 2015 is shaping up to be an extremely active year. Here are some survey highlights: 76% of respondents say they’ve experienced a damaging security breach in the previous 12 months, with consequences ranging from corruption of servers, revenue loss, prolonged email system failure, and loss of employee data 50% of respondents place cyber threat prevention in the top three IT issues within their organization 54% of companies with 1,000 or more employees are increasing their IT security budgets for 2015 While these statistics are certainly alarming, there are some telling data points in the survey that suggest that organizational policy can prevent some of the breach scenarios. When asked about organizational security risks, three of the top five were (in order of risk): end user, password compromise and cloud vulnerability. Further down the list, BYOD makes an appearance. In many of our previous blogs on network security, we provide some tips and tools for preventing many of these vulnerabilities from becoming big issues. It might be a good time to revisit some of these posts and incorporate some of these thoughts into your network security planning . An Eight Step Network Security Assessment for a Secure 2015 – In this post we share the eight key steps we take in conducting network security assessments and audits for our clients: 1. Recognize your organization’s current digital footprint

The evolving cyber threat cloud and data security resources to consider

  • Upload
    ronpoul

  • View
    10

  • Download
    3

Embed Size (px)

Citation preview

Page 1: The evolving cyber threat   cloud and data security resources to consider

The Evolving Cyber Threat: Cloud and Data Security Resources to Consider

QuinStreet Enterprise recently released results of a survey on the current state of Cyber-Threats. The survey of 387 business and IT executives, 2015 Security Outlook: Meeting Today’s Evolving Cyber Threats, revealed more of what we’ve already blogged about regarding cyber threats and security breaches; namely that 2015 is shaping up to be an extremely active year.Here are some survey highlights:

76% of respondents say they’ve experienced a damaging security breach in the previous 12

months, with consequences ranging from corruption of servers, revenue loss, prolonged email

system failure, and loss of employee data

50% of respondents place cyber threat prevention in the top three IT issues within their

organization

54% of companies with 1,000 or more employees are increasing their IT security budgets for

2015

While these statistics are certainly alarming, there are some telling data points in the survey that suggest that organizational policy can prevent some of the breach scenarios. When asked about organizational security risks, three of the top five were (in order of risk): end user, password compromise and cloud vulnerability. Further down the list, BYOD makes an appearance.

In many of our previous blogs on network security, we provide some tips and tools for preventing many of these vulnerabilities from becoming big issues. It might be a good time to revisit some of these posts and incorporate some of these thoughts into your network security planning.

An Eight Step Network Security Assessment for a Secure 2015 – In this post we share the

eight key steps we take in conducting network security assessments and audits for our clients:

1. Recognize your organization’s current digital footprint

Page 2: The evolving cyber threat   cloud and data security resources to consider

2. Assess vulnerabilities of employees, partners, and other stakeholders (many of these can be

deemed end users – number one of the risk list above)

3. Assess the vulnerabilities of networks, applications, and other IT resources

4. Conduct comprehensive scanning of ports, vectors, and protocols

5. Understand how your network interacts with outside parties

6. Probe your internal network weaknesses

7. Review wireless nets, including Wi-Fi, Bluetooth, RFID, and rogue devices (this includes BYOD

device usage and policies)

8. Assess and educate employees about social engineering attacks

6 Things to Consider When Using the Cloud for Data Storage – This post covers how to plan for

the unexpected, the legal implications of a data breach, establishing data usage policies, and how to

think long term when it comes to data and the cloud.

Considerations for Storing Data in the Cloud – This post provides some additional insights and

thoughts you need to keep in mind before mixing the public cloud with your corporate data.

Two Password Management Tips for Better Computer Network Security – This post shares some

password faux pas along with two important tips:

1. Use a password management system – there are many now on the market that are excellent

and many are free to use

2. Change your passwords often – seems obvious until you realize how infrequently it happens

These are just a few of the posts that speak to network and data security, BYOD tips, and ways to utilize cloud computing safely. Be sure to check them out! 2015 is off to a cyber-threat bang and we’ll be sure to keep you updated as the year unfolds.

For more information, visit: Virtual.com